From patchwork Thu Apr 16 06:47:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86210 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6DBBCFA0C5E for ; Thu, 16 Apr 2026 06:48:21 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7569.1776322099793783901 for ; Wed, 15 Apr 2026 23:48:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=STr9bOYR; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a29e6110so80097255e9.3 for ; Wed, 15 Apr 2026 23:48:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322098; x=1776926898; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=jRCl0tVwqYErBK7HJ84GPbGXwrPXvclOxp+FY6afpe0=; b=STr9bOYRTSHNsiz5SofIkpbS+cPVrOnZiB38b1VGb4vMJHdliw4G4RYDVs63Vr4ctS hWmz1BLzOb3t/xnfkzF/Wp1LB6fQbhIwzxFfidMhxkUZhxJUXd6786Anyz1RaIrg8GP1 AZg5nqC3bchsqAZg2r3NejqQzmfmHUzP5VR2s= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322098; x=1776926898; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=jRCl0tVwqYErBK7HJ84GPbGXwrPXvclOxp+FY6afpe0=; b=Njcc3I9ZycFn8tZ/GTCUwu8hI7Jn/mLuv8lyTdegfnMiBZ0DdFZMaPLdJV/s5E3YJM dz1v8KiM48v9M/VsySFDI+7AlBLR9DHJzzTaKbmF0KBgKGJyLdIl4u7JCLcAY0oKpD4Y Ku1MqxlDbW5mUKL/j/389NN4pa5ybvl3MNQMi9bLckScyit2ewabbX3g8pG2DCEn0r5S +SO2dw+ojjQYmRt2mDXUmLMp6NfE+FKNJ51TYABr90eGZ9HaLAzJwCYZupjCrGIc/+FP zJyAGHQ2XSS1n2lOPKaCtdiOpUbB0Onj/9ckyRxEUiaPheF+0ZnJI3yTXxNxi1AzrL3a VfMA== X-Gm-Message-State: AOJu0YycqnkpIiuy7XLH3VWoHjO+eu6sVwra1fOnhzfyGCP/HwDMmIDb dxUSKvp8Sq9wvHw56IBd+5amAmfSSGsDoMd3FuD4ZjnCShrDH7T1LwhcsduRTTzomN4KvuJ490t X38lbtavH2WIi X-Gm-Gg: AeBDietQKKaDXBBXaLGLI3ojNgm8K4OvSA39xxI1OSeTY61pr1BDCoqRlFtttKTkpHR jjT0MQApT8pjZj7dVUIEVnMrCAcNNY/6cUjtqYYLZX/GEaZlWTJysytY5rx/UvXpAR/dV+M+tEM UjAxgFLAKTCWo3LY6OoNP9YBUBgu9m8LfUy0OoujKArTAB1TePnIYf+sglILsQPP5RX5mh7UGcc 0pWPdOOL6b6I3QmiBPkX9YuBUls2JwGAWmad+AuMeEL0hgjE4rlh3bJWmKvvHVteKUUNiSFwGD0 V77WH5AMlJmWuXT3ukbIe/E2EP+EAHWO4xHjDX3BkSrnQb13ospjS/wE3lZDdiUVn2sn9xPNbu1 0Zg1yQbzPRUn9UHHBax+B3EdRKGc6GfShdcj7+3rdMIm3LYRp4J4cuMXaJJA5VX76UkSb7wuBvk KWlYXTY01Jdwhsp3PAwWAP1yyLzffxItxhBpAL+TdNQ8NSn+5y/klPkbguG75d3kZM3T1rbCy5C RZocgyZadK25yyQpE2AJ1BY0+ScieIXW2iOMA== X-Received: by 2002:a05:600c:4f56:b0:480:690e:f14a with SMTP id 5b1f17b1804b1-488d68765fcmr365878595e9.14.1776322097649; Wed, 15 Apr 2026 23:48:17 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:17 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 01/47] binutils: mark CVE-2025-69650 and CVE-2025-69651 as disputed Date: Thu, 16 Apr 2026 08:47:02 +0200 Message-ID: <8c5819cb2464d5dcc5c0812ae1d8c2f1e0db6866.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:21 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235344 From: Adarsh Jagadish Kamini Both CVEs are disputed by third parties. The observed behavior (double free / invalid pointer free in readelf) only occurred in pre-release code and did not affect any tagged version [1][2]. CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" [1] https://www.cve.org/CVERecord?id=CVE-2025-69650 [2] https://www.cve.org/CVERecord?id=CVE-2025-69651 Signed-off-by: Adarsh Jagadish Kamini (cherry picked from commit 9c6df56fe18237880c391798c2083dca595566f4) Signed-off-by: Yoann Congal --- meta/recipes-devtools/binutils/binutils-2.45.inc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 16a63cabc5b..5cd4d185ac1 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -20,6 +20,8 @@ UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P\d+_(\d_?)*)" CVE_STATUS[CVE-2025-7545] = "cpe-stable-backport: fix available in used git hash" CVE_STATUS[CVE-2025-7546] = "cpe-stable-backport: fix available in used git hash" +CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" +CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" SRCREV ?= "2f028c6bb163a045db95439fb92e1dcbc919413c" BINUTILS_GIT_URI ?= "git://sourceware.org/git/binutils-gdb.git;branch=${SRCBRANCH};protocol=https" From patchwork Thu Apr 16 06:47:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86207 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F31CF88061 for ; Thu, 16 Apr 2026 06:48:21 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7570.1776322100312109347 for ; Wed, 15 Apr 2026 23:48:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=05jdYds9; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a041eae5so56481185e9.1 for ; Wed, 15 Apr 2026 23:48:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322098; x=1776926898; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dt1M0hjFPQy+nrXXcZjpbAN1WP3yljs53m7NcGDM1Ek=; b=05jdYds9UBe8FN7IEP6KdQ+ln2hcRA4n4fX/7GIzD40PDA+PLS1n4dWhYiX/g05t+C jwRtvc3WgrScjRnyA49kTB+y56A5q1mhDS8pPFOriL0bdQ+mu6v4vy9z/w+fz5/ZkAc/ Xa/7oKsSAWksPsamW/0EiQYY8TANLr1+jt2fY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322098; x=1776926898; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=dt1M0hjFPQy+nrXXcZjpbAN1WP3yljs53m7NcGDM1Ek=; b=kO/3LdLFx1VAGYFmOPDBzZ06r1gOG00R+VxZCguRQzbp43v+CB8g8YEv5Jeqzc08N0 5ePIklCVVmL8O4e2XUqePWTGpCW4c+8PvfQ2O4aZdOkVEr5Kw6lmEuK65FeJiW5av02o XaK6pj/1SEMyl7PfgJsQhBhwnvaLeRR7lUrxL7GTXwzB/BP4wD4YJhKXTSoRFce6Nxwa Ng/Kb5JwDFEfYtSVTKNyNAE4OyxLWal0LraaZLs3m41CyLzSWFfwUynwKyI3OmtKUmd3 7V3MrZgqKaHDy5GqXyRatXa3RUnB20TCIIPpKcQpnXr8bp29pmi91IHjLTVJMNmxP4Z6 sWPg== X-Gm-Message-State: AOJu0YytXOwZtTQwOuJPJkKsu0uGbsM1MpZPz5Ec0ogD0bo5yHAm9Cl+ /ElgbVw/7btep8sRfv7kDHcv8K5dAYTcW8HR+BFsZlsuHEVHtUz18Sj+2wQMTSSbj3xzKHG0B// kMhuoOumMErMy X-Gm-Gg: AeBDievgLwzX0HJYGKU1qirsEy7217BW9ZJA5rIA5HWGGDwyVPUS73iW9qPZM4zUccf bof5yjM+xFVJiEvMRZ25xCRzBydXgl0NSlbd06IC7ppQgCV6WIVLxIhNyFzx9JCop9r3rWUVCBu Xj8rbNIV3PQ82+WB8fAIpDzTJP2B93TzsRK5pVmCSqitVKcUrBkv7nqT51hxhi2s/hmhkprw86Y NHfX658hFrwmIudLwHAFk2Cabf93j9hGi8xQ3ef5Lg4FZM95L7Kb1P81eiwRSz8OpW9QHwj/3v5 Ilt0iobQrFeUAX95+38EnfpLlgI3dr8lUPwAhB39nGyu/jG3tSjmC2FQzBLlOw40G+xeyqb48fs TDKB2Su62mk7jgwAPdLp5ktYowfOVZ8vgOmm33FOZ0eNEW89/UbfxYKlWb8E/Vhj/HYielZeamg R4ZQCOiskEKOLXbUBnatvZY01rkR5k8tBygyC9c/eQM013cP8PcC5zA67zK8sy3PpdLtOSkvGNb ZFveoLD19L1zk+K5Nq2jtMugFK31fCpXsWzZ3bh27Ya3yXS X-Received: by 2002:a05:600c:4186:b0:488:a25e:14b2 with SMTP id 5b1f17b1804b1-488e860ff54mr90683285e9.9.1776322098140; Wed, 15 Apr 2026 23:48:18 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:17 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 02/47] binutils: Fix CVE-2025-69648 Date: Thu, 16 Apr 2026 08:47:03 +0200 Message-ID: <4fe1e54ace667e91929ec66bc3e6d7d03db981da.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:21 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235343 From: Deepak Rathore Pick the patch [1] as mentioned in [2]. [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69648 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../binutils/binutils/CVE-2025-69648.patch | 189 ++++++++++++++++++ 2 files changed, 190 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 5cd4d185ac1..83907f24afa 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -48,4 +48,5 @@ SRC_URI = "\ file://0018-CVE-2025-11494.patch \ file://0019-CVE-2025-11839.patch \ file://0020-CVE-2025-11840.patch \ + file://CVE-2025-69648.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch new file mode 100644 index 00000000000..ce0e764762f --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69648.patch @@ -0,0 +1,189 @@ +From 7df481dd76c05c89782721e9df5468be829c356b Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Sat, 22 Nov 2025 09:22:10 +1030 +Subject: [PATCH] PR 33638, debug_rnglists output + +The fuzzed testcase in this PR continuously outputs an error about +the debug_rnglists header. Fixed by taking notice of the error and +stopping output. The patch also limits the length in all cases, not +just when a relocation is present, and limits the offset entry count +read from the header. I removed the warning and the test for relocs +because the code can't work reliably with unresolved relocs in the +length field. + + PR 33638 + * dwarf.c (display_debug_rnglists_list): Return bool. Rename + "inital_length" to plain "length". Verify length is large + enough to read header. Limit length to rest of section. + Similarly limit offset_entry_count. + (display_debug_ranges): Check display_debug_rnglists_unit_header + return status. Stop output on error. + +CVE: CVE-2025-69648 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=598704a00cbac5e85c2bedd363357b5bf6fcee33] + +(cherry picked from commit 598704a00cbac5e85c2bedd363357b5bf6fcee33) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 67 ++++++++++++++++++++++++------------------------ + 1 file changed, 34 insertions(+), 33 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index f4bcb677761..b4fb56351ec 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -8282,7 +8282,7 @@ display_debug_rnglists_list (unsigned char * start, + return start; + } + +-static int ++static bool + display_debug_rnglists_unit_header (struct dwarf_section * section, + uint64_t * unit_offset, + unsigned char * poffset_size) +@@ -8290,7 +8290,8 @@ display_debug_rnglists_unit_header (struct dwarf_section * section, + uint64_t start_offset = *unit_offset; + unsigned char * p = section->start + start_offset; + unsigned char * finish = section->start + section->size; +- uint64_t initial_length; ++ unsigned char * hdr; ++ uint64_t length; + unsigned char segment_selector_size; + unsigned int offset_entry_count; + unsigned int i; +@@ -8299,66 +8300,59 @@ display_debug_rnglists_unit_header (struct dwarf_section * section, + unsigned char offset_size; + + /* Get and check the length of the block. */ +- SAFE_BYTE_GET_AND_INC (initial_length, p, 4, finish); ++ SAFE_BYTE_GET_AND_INC (length, p, 4, finish); + +- if (initial_length == 0xffffffff) ++ if (length == 0xffffffff) + { + /* This section is 64-bit DWARF 3. */ +- SAFE_BYTE_GET_AND_INC (initial_length, p, 8, finish); ++ SAFE_BYTE_GET_AND_INC (length, p, 8, finish); + *poffset_size = offset_size = 8; + } + else + *poffset_size = offset_size = 4; + +- if (initial_length > (size_t) (finish - p)) +- { +- /* If the length field has a relocation against it, then we should +- not complain if it is inaccurate (and probably negative). +- It is copied from .debug_line handling code. */ +- if (reloc_at (section, (p - section->start) - offset_size)) +- initial_length = finish - p; +- else +- { +- warn (_("The length field (%#" PRIx64 +- ") in the debug_rnglists header is wrong" +- " - the section is too small\n"), +- initial_length); +- return 0; +- } +- } +- +- /* Report the next unit offset to the caller. */ +- *unit_offset = (p - section->start) + initial_length; ++ if (length < 8) ++ return false; + + /* Get the other fields in the header. */ ++ hdr = p; + SAFE_BYTE_GET_AND_INC (version, p, 2, finish); + SAFE_BYTE_GET_AND_INC (address_size, p, 1, finish); + SAFE_BYTE_GET_AND_INC (segment_selector_size, p, 1, finish); + SAFE_BYTE_GET_AND_INC (offset_entry_count, p, 4, finish); + + printf (_(" Table at Offset: %#" PRIx64 ":\n"), start_offset); +- printf (_(" Length: %#" PRIx64 "\n"), initial_length); ++ printf (_(" Length: %#" PRIx64 "\n"), length); + printf (_(" DWARF version: %u\n"), version); + printf (_(" Address size: %u\n"), address_size); + printf (_(" Segment size: %u\n"), segment_selector_size); + printf (_(" Offset entries: %u\n"), offset_entry_count); + ++ if (length > (size_t) (finish - hdr)) ++ length = finish - hdr; ++ ++ /* Report the next unit offset to the caller. */ ++ *unit_offset = (hdr - section->start) + length; ++ + /* Check the fields. */ + if (segment_selector_size != 0) + { + warn (_("The %s section contains " + "unsupported segment selector size: %d.\n"), + section->name, segment_selector_size); +- return 0; ++ return false; + } + + if (version < 5) + { + warn (_("Only DWARF version 5+ debug_rnglists info " + "is currently supported.\n")); +- return 0; ++ return false; + } + ++ uint64_t max_off_count = (length - 8) / offset_size; ++ if (offset_entry_count > max_off_count) ++ offset_entry_count = max_off_count; + if (offset_entry_count != 0) + { + printf (_("\n Offsets starting at %#tx:\n"), p - section->start); +@@ -8372,7 +8366,7 @@ display_debug_rnglists_unit_header (struct dwarf_section * section, + } + } + +- return 1; ++ return true; + } + + static bool +@@ -8404,6 +8398,7 @@ display_debug_ranges (struct dwarf_section *section, + uint64_t last_offset = 0; + uint64_t next_rnglists_cu_offset = 0; + unsigned char offset_size; ++ bool ok_header = true; + + if (bytes == 0) + { +@@ -8493,8 +8488,12 @@ display_debug_ranges (struct dwarf_section *section, + /* If we've moved on to the next compile unit in the rnglists section - dump the unit header(s). */ + if (is_rnglists && next_rnglists_cu_offset < offset) + { +- while (next_rnglists_cu_offset < offset) +- display_debug_rnglists_unit_header (section, &next_rnglists_cu_offset, &offset_size); ++ while (ok_header && next_rnglists_cu_offset < offset) ++ ok_header = display_debug_rnglists_unit_header (section, ++ &next_rnglists_cu_offset, ++ &offset_size); ++ if (!ok_header) ++ break; + printf (_(" Offset Begin End\n")); + } + +@@ -8548,10 +8547,12 @@ display_debug_ranges (struct dwarf_section *section, + } + + /* Display trailing empty (or unreferenced) compile units, if any. */ +- if (is_rnglists) ++ if (is_rnglists && ok_header) + while (next_rnglists_cu_offset < section->size) +- display_debug_rnglists_unit_header (section, &next_rnglists_cu_offset, &offset_size); +- ++ if (!display_debug_rnglists_unit_header (section, ++ &next_rnglists_cu_offset, ++ &offset_size)) ++ break; + putchar ('\n'); + + free (range_entries); +-- +2.35.6 + From patchwork Thu Apr 16 06:47:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86209 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 90571F88063 for ; Thu, 16 Apr 2026 06:48:21 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7712.1776322100838163062 for ; Wed, 15 Apr 2026 23:48:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=WKHnLexd; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43d7645adbdso2516067f8f.1 for ; Wed, 15 Apr 2026 23:48:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322099; x=1776926899; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=d6XAEGQClgddjeaNto+n8UoU6NIcYBseFMsbVOFt2VU=; b=WKHnLexdr/nsQ/+McASU8cKED4KZx7AaM/4wwpqjPCT6VdUW7Exn9X402hHu2VAWBh z8FT+EXNhmIvZraFCmtSF/Ygq9StQ1yuGr5UtRKsWJ5O+pw3jnLU2YgVO15G7revqs1B uBTVtVYxrlEnDG5j9gcXNMCwIhx6qBbKwk/Ls= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322099; x=1776926899; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=d6XAEGQClgddjeaNto+n8UoU6NIcYBseFMsbVOFt2VU=; b=I/WgJyvDxhzE9I3AR7Tu4yHbLA8rMY6zkQhQxHvm+zmZodU2pVft1p1O52/iy/IcwY AyoTMnKyF1gxnGaKX3/Sj364kanI+kb+uEbp39wSdfqGJDJdLWR9C1+d5ZPqlq+Mdsad vzksgQAgX9647mMgMX/Ae+e6mgJA98/YS+A+PcgG8K4TrXChaZOr0LJEewhcNWl5aiVD QZnQbd+nQFjlFzwpelMIgyllUQyZUFwgujFYPXTPAyWBqvE3UXZtFfwMDnvoEQg1lUFb sTQk2HPsigpw5uIrQIjAaWkwrMO0pcXcN/4VJdQVFi0ZbALV9ug+sulJvoHV4EeAyCtT 05TQ== X-Gm-Message-State: AOJu0Yy2fUFjdEl0fORBc6O+aD0izu7t2/poKyBe3jYqERJIuMq8iGnR mARMXDMH9NvzYzb3FQ2yU6gofdMQi9GMe8bf/4MCfRgi/oRrN6Nm6OBB+Mmw+eJw1yDgKosZO7Y pRCxWRNdWnGnz X-Gm-Gg: AeBDietB7bZqgsXbZ7+TzSDs/aa7/pp2Plbb2QFA0+xTyBS0QGXmQiIFE/PkaBZ4+02 YAyhCMMlBzsThCUB7CmWfeZggPQ9HfHa5aualQ4mrMSnArzLbmr7B1yHMDl4LexRrF8AdluncVF clU7m2ZRMFCry7PHzHvcjensZVkRPwr9LlysHBc+nkF7Ll1WTTuRPFslryRJoi3NPqb0hqefCWy NrDvcKcvXxDdGav1wGGKd3X47OcqXEB4rDsPwCOgV90LoLcYs7xWzarWnRKoXAen6bovFcW/UEb QyM9wJEyB+DeA+z8TFqI6/NWavoJXh1XnpzcpuBBM3QUz+l0VGw12v8xsy72jDAW7IQsZMpRfoK VoPnEmB4sPG8/6z+cW4Agr9mN7L8wIv2uiyvXAk00FpNLm/vT93LlrCjYSu7kFXaIajx4BLRRWH 53AwpxkWAvC/Vfsuu/zKHpzLFzC9Ki3zAqRhBGrditotRAvjcpQLnfw5o5609kiB19yY8K0wIKg gSO4KDnNK/EQ5HJqJ8amDyktGKJEA4sHs2sxw== X-Received: by 2002:a05:6000:2506:b0:43f:dc86:d61f with SMTP id ffacd0b85a97d-43fdc86e3fcmr218366f8f.14.1776322098912; Wed, 15 Apr 2026 23:48:18 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.18 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:18 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 03/47] binutils: Fix CVE-2025-69644 CVE-2025-69647 Date: Thu, 16 Apr 2026 08:47:04 +0200 Message-ID: <27bf3c1db29d874bb01cd84c6827010664b8a61e.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:21 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235345 From: Deepak Rathore Pick the patch [1] as mentioned in [2] and [3]. [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=455446bbdc8675f34808187de2bbad4682016ff7 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69644 [3] https://nvd.nist.gov/vuln/detail/CVE-2025-69647 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../CVE-2025-69644_CVE-2025-69647.patch | 85 +++++++++++++++++++ 2 files changed, 86 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 83907f24afa..a2bb278b438 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -49,4 +49,5 @@ SRC_URI = "\ file://0019-CVE-2025-11839.patch \ file://0020-CVE-2025-11840.patch \ file://CVE-2025-69648.patch \ + file://CVE-2025-69644_CVE-2025-69647.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch new file mode 100644 index 00000000000..78c3899af91 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69644_CVE-2025-69647.patch @@ -0,0 +1,85 @@ +From 46efc6c469c85aefd6321150e702081823ca815c Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Sat, 22 Nov 2025 09:52:18 +1030 +Subject: [PATCH] PR 33639 .debug_loclists output + +The fuzzed testcase in this PR prints an almost endless table of +offsets, due to a bogus offset count. Limit that count, and the total +length too. + + PR 33639 + * dwarf.c (display_loclists_unit_header): Return error on + length too small to read header. Limit length to section + size. Limit offset count similarly. + +CVE: CVE-2025-69644 CVE-2025-69647 +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=455446bbdc8675f34808187de2bbad4682016ff7] + +(cherry picked from commit 455446bbdc8675f34808187de2bbad4682016ff7) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 20 ++++++++++++++------ + 1 file changed, 14 insertions(+), 6 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index b4fb56351ec..2462e6540a7 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -7257,8 +7257,6 @@ display_loclists_unit_header (struct dwarf_section * section, + bool is_64bit; + uint32_t i; + +- printf (_("Table at Offset %#" PRIx64 "\n"), header_offset); +- + SAFE_BYTE_GET_AND_INC (length, start, 4, end); + if (length == 0xffffffff) + { +@@ -7267,6 +7265,11 @@ display_loclists_unit_header (struct dwarf_section * section, + } + else + is_64bit = false; ++ if (length < 8) ++ return (uint64_t) -1; ++ ++ printf (_("Table at Offset %#" PRIx64 "\n"), header_offset); ++ header_offset = start - section->start; + + SAFE_BYTE_GET_AND_INC (version, start, 2, end); + SAFE_BYTE_GET_AND_INC (address_size, start, 1, end); +@@ -7279,15 +7282,21 @@ display_loclists_unit_header (struct dwarf_section * section, + printf (_(" Segment size: %u\n"), segment_selector_size); + printf (_(" Offset entries: %u\n"), *offset_count); + ++ if (length > section->size - header_offset) ++ length = section->size - header_offset; ++ + if (segment_selector_size != 0) + { + warn (_("The %s section contains an " + "unsupported segment selector size: %d.\n"), + section->name, segment_selector_size); +- return (uint64_t)-1; ++ return (uint64_t) -1; + } + +- if ( *offset_count) ++ uint64_t max_off_count = length >> (is_64bit ? 3 : 2); ++ if (*offset_count > max_off_count) ++ *offset_count = max_off_count; ++ if (*offset_count) + { + printf (_("\n Offset Entries starting at %#tx:\n"), + start - section->start); +@@ -7304,8 +7313,7 @@ display_loclists_unit_header (struct dwarf_section * section, + putchar ('\n'); + *loclists_start = start; + +- /* The length field doesn't include the length field itself. */ +- return header_offset + length + (is_64bit ? 12 : 4); ++ return header_offset + length; + } + + static int +-- +2.35.6 + From patchwork Thu Apr 16 06:47:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86222 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A65AF88079 for ; Thu, 16 Apr 2026 06:48:32 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7713.1776322101949303778 for ; Wed, 15 Apr 2026 23:48:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=a99T2Eta; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43d74086e5bso3154207f8f.0 for ; Wed, 15 Apr 2026 23:48:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322100; x=1776926900; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LAr4fTMWwU+MyfZAnRmFaZ/19JNM+e3XSkkF7nKjfgE=; b=a99T2EtayJorkrn0dH0epSePINodFWTdN1ZDwyjRHZEyqp78wyMwPZHrPSh35BzuCp fnJ17hzu7+GWL+OxhrN+fh91Rb7REm5KxXkrRFgvE1i8qN6MMlM7V4S9Hpprwpq9uVUn 9jWDPVCvVZMmHP6mlGQHxrGJ5sMFxxxbKV+/0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322100; x=1776926900; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=LAr4fTMWwU+MyfZAnRmFaZ/19JNM+e3XSkkF7nKjfgE=; b=UHwRteswP203+xhTSf3+vRQEYxVuA+MX3ii8UHayWxBcfgxsPmB9oPqLW7Kr3Dw0Dv BEqI+d6Aasg61r9fxGMyIojg8dZUC5cgvo5zREF6q5t0MpISt/O/g5aCaZpm3+74ltmy 1Vwds/oql2xQNkgOGeMKNb5skzC+CcUtRYPVJunZjGSryizP5R5V6iophr2i/4Qx0wa3 iRMukUq+EjtEb8zxVvLlRzRoezggIzqyzSu5Cl3jGUYecu67Gs9kjCx6Dc65L9bp5G15 hBW+2U5o1I7Og1+a7Ulyjs8wAZlWtuf1auTxcDGn2LaaZYBk0yTDskiMLrcL6kdBQ9ZI N5yg== X-Gm-Message-State: AOJu0YwNxjo757ADPfPnT7s6jFVtqBmYug6Uv+XHlF00uzQJtWwCQMmL d10Ef1SvUEVL/+506af+7hIjLa1qsmWZzvOF0CcZLWu3bLSLQeMEKmfK5x1/L85dVYVwp8QdXtj zQ7hfS5fYNBbA X-Gm-Gg: AeBDieun+9pZ9fpub4P5dl6XGnKmQXCPCaPHB5Oez+8TdxSogjf2xP+Rcx/nodgBC5N bLU9iaZSVMU4OmYJpOOdWIyXkCcu2iX/b+uwtvlxlzw+tMFyqcx6hQWNoufAAuLzIJV9s38gjFi vErAxeSovyAi7iB3c5ajTrtYVM7WSVUA1vnyu141Hkn82x1ZpvntDOgItsaQw0f/uoCjGAfT7X8 DHduS6+dnXH6JE2wGEyuwJmeq378rKhan94SHSazeXl5AMeoe5K4B0s7btivAXoZ5PTyqBCpztQ KWiwGFgn4rotN/YCkjtSrFX23tL+DLg8hXTEKogc1u6iCpmnIfLnu13I0BEyQwxJcjjPVCG+8oc BRa18y+Vn/CVafbCx6y4BCuBQpmLG1chyuVD4knbWSxt8jVouzlfn1pcJHAeAT6hgz+1ICgI5sR SB1Msef3dBrUr8HklBiiSpqX1c5wLAnMc98CvM8yluAhlXY79qrvrJwV5g4pYMkpBTe1VTwWX3L plF+zmhuxC+uqVpvi3cOv2yUa4pxIQE0tdgD15hhjC6WKs8 X-Received: by 2002:a05:6000:250c:b0:43d:7125:e79f with SMTP id ffacd0b85a97d-43d7125e7f1mr25957425f8f.47.1776322099912; Wed, 15 Apr 2026 23:48:19 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:19 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 04/47] binutils: Fix CVE-2025-69649 Date: Thu, 16 Apr 2026 08:47:05 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235346 From: Deepak Rathore Pick the patch [1] as mentioned in [2] [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69649 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../binutils/binutils/CVE-2025-69649.patch | 41 +++++++++++++++++++ 2 files changed, 42 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index a2bb278b438..94b7ca54cb8 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -50,4 +50,5 @@ SRC_URI = "\ file://0020-CVE-2025-11840.patch \ file://CVE-2025-69648.patch \ file://CVE-2025-69644_CVE-2025-69647.patch \ + file://CVE-2025-69649.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch new file mode 100644 index 00000000000..05b382ea526 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69649.patch @@ -0,0 +1,41 @@ +From cc53801dff2ba4bc62eaa666b3b7d9401232089c Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Mon, 8 Dec 2025 15:58:33 +1030 +Subject: [PATCH] PR 33697, fuzzer segfault + + PR 33697 + * readelf.c (process_relocs): Don't segfault on no sections. + +CVE: CVE-2025-69649 +Upstream-Status: Backport [https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=66a3492ce68e1ae45b2489bd9a815c39ea5d7f66] + +(cherry picked from commit 66a3492ce68e1ae45b2489bd9a815c39ea5d7f66) +Signed-off-by: Deepak Rathore +--- + binutils/readelf.c | 8 +++----- + 1 file changed, 3 insertions(+), 5 deletions(-) + +diff --git a/binutils/readelf.c b/binutils/readelf.c +index 8f188e8c3e2..8d28b1c30e4 100644 +--- a/binutils/readelf.c ++++ b/binutils/readelf.c +@@ -9621,13 +9621,11 @@ process_relocs (Filedata * filedata) + size_t i; + bool found = false; + +- for (i = 0, section = filedata->section_headers; +- i < filedata->file_header.e_shnum; +- i++, section++) +- { ++ section = filedata->section_headers; ++ if (section != NULL) ++ for (i = 0; i < filedata->file_header.e_shnum; i++, section++) + if (display_relocations (section, filedata)) + found = true; +- } + + if (! found) + { +-- +2.35.6 + From patchwork Thu Apr 16 06:47:06 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86223 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 36F1BF8807D for ; Thu, 16 Apr 2026 06:48:32 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7714.1776322102490660140 for ; Wed, 15 Apr 2026 23:48:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=oRrrvVai; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43d7213b6ebso2681908f8f.3 for ; Wed, 15 Apr 2026 23:48:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322101; x=1776926901; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zDE2oMd6A8MPLHjKWApZ7+QCv1hTduoyi20a5EWGbnY=; b=oRrrvVaiHCJFMEit+TuTHlNz3thX0qSYZ9LtWgdv9c22SpaqpbF1PDYeFgzYckymuh LOZNeSpi0oFesCutTg+dBhhr+hpJlS5Z9wodIWdBoaTtlAhMcQYWiRacKWybdSy3quLR 9VbyOOIpCm0F5+2Mp9RuhFlG7W5dkDdGzkjsY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322101; x=1776926901; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=zDE2oMd6A8MPLHjKWApZ7+QCv1hTduoyi20a5EWGbnY=; b=shQpwIsY1TNu2jEahQO1T+kOORk03dm9uVw9MeVs89EBMvaP8fbPfXxB1SN7nx4IK9 N4Ose4qGWD2YVgkIt1YNWHghdJfinX0QwdjZoXXTQDLRjWktdePSPDC7xI4rGUwi29wj HfZB+yk98Smi0AKmb9kuLe1MkoeuLQJa5qgOHDj47ulD8oo4ilHgqn4p1ZkLVztqfgRo 2r04xbs4yY7+6IINIyvb5v5e6BNnyZJC4LOCU0xm5KUPyPJscGpDnihI+Po6cvfW/SAS kUvu8CCkT5FrwLw1nEzCZQpAVuOscMeS+zTSdHcoN+7KEn9tLUeMNvZeqTT5wKn6pjrG QPIw== X-Gm-Message-State: AOJu0YzbKk2xdQ8KiEBh1YSYTGNlqzTGZR9H6q/P74PGu+cch2e7YaeA NWwWdjze8gsNI6AH5tab8r/IaQGpi3DU3TbHXdMsoHD4u9f5oQn9x6ZaAPdBJVixiE4VvdOr3nC md0O5kkhO0HX3 X-Gm-Gg: AeBDievP8x2R9YZFL1Nu9Fq7z9abHquq09oqm4dz6UxWrb8yD76H0aCtaDJNG32/pqI TDsH9kwxNeiHy2mi7rawMf5Fnovxbao/Zj3+hr9BPDXSft3qc92KV5/Qa39EHZX56IjapgTapnw gsr4ttSSxP4FjO+ApznXLk62jbntEtZUwxmXEw1s9BY9+MK4GA24SUrXceWtqHdy5UDr/0lqvqq +mSMBTT9iOQtZRpyNsqMX2Y63gqmFqpbDHTluaWqY2KBDpCIXp7XAISl3Pv/5CFItNd4wtBbKuj v2fipW7kBzmGx3UHrBjPzTvDUoxkXA1bel0mOYOIwXQTib63FawYF/S0SG1dC8gGeG348mS0Z2D 2ePxX8H3uNGrCOcFml29UA8RVMPts7cKzZVi1yArheLIKqnNO7iD59y5nUINb6WcWrSWcvVbpMa +6yAahxWowEAf+76Pl8RvyB8tPFFjo8YwUC0PtM7nTSZMDF7zJO0x/oKcBK9gaKs0cdJtcuX1gn cB2xwfEk26KLntb1IqxPdJRDFnt3vip8AxwHQ== X-Received: by 2002:a5d:5d83:0:b0:43d:1c49:ce35 with SMTP id ffacd0b85a97d-43d64259c9fmr37156152f8f.3.1776322100475; Wed, 15 Apr 2026 23:48:20 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:20 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 05/47] binutils: Fix CVE-2025-69652 Date: Thu, 16 Apr 2026 08:47:06 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235347 From: Deepak Rathore Pick the patch [1] as mentioned in [2]. [1] https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01 [2] https://nvd.nist.gov/vuln/detail/CVE-2025-69652 Signed-off-by: Deepak Rathore Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + .../binutils/binutils/CVE-2025-69652.patch | 40 +++++++++++++++++++ 2 files changed, 41 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index 94b7ca54cb8..f635d76069a 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -51,4 +51,5 @@ SRC_URI = "\ file://CVE-2025-69648.patch \ file://CVE-2025-69644_CVE-2025-69647.patch \ file://CVE-2025-69649.patch \ + file://CVE-2025-69652.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch b/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch new file mode 100644 index 00000000000..5de94820d1d --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/CVE-2025-69652.patch @@ -0,0 +1,40 @@ +From 5a2f57ab03067f6622c19983e1e31207bd2293a6 Mon Sep 17 00:00:00 2001 +From: Alan Modra +Date: Mon, 8 Dec 2025 16:04:44 +1030 +Subject: [PATCH] PR 33701, abort in byte_get_little_endian + + PR 33701 + * dwarf.c (process_debug_info): Set debug_info_p NULL when + DEBUG_INFO_UNAVAILABLE. + +CVE: CVE-2025-69652 +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=44b79abd0fa12e7947252eb4c6e5d16ed6033e01] + +(cherry picked from commit 44b79abd0fa12e7947252eb4c6e5d16ed6033e01) +Signed-off-by: Deepak Rathore +--- + binutils/dwarf.c | 8 +++++--- + 1 file changed, 5 insertions(+), 3 deletions(-) + +diff --git a/binutils/dwarf.c b/binutils/dwarf.c +index 2462e6540a7..0d88ea94619 100644 +--- a/binutils/dwarf.c ++++ b/binutils/dwarf.c +@@ -4248,9 +4248,11 @@ process_debug_info (struct dwarf_section * section, + break; + } + +- debug_info *debug_info_p = ((debug_information +- && unit < alloc_num_debug_info_entries) +- ? debug_information + unit : NULL); ++ debug_info *debug_info_p = NULL; ++ if (debug_information ++ && num_debug_info_entries != DEBUG_INFO_UNAVAILABLE ++ && unit < alloc_num_debug_info_entries) ++ debug_info_p = debug_information + unit; + + assert (!debug_info_p + || (debug_info_p->num_loc_offsets +-- +2.35.6 + From patchwork Thu Apr 16 06:47:07 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86219 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CB7C7F8806B for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7715.1776322103673418337 for ; Wed, 15 Apr 2026 23:48:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=GQIVdYAY; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43eada6d900so1245166f8f.0 for ; Wed, 15 Apr 2026 23:48:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322102; x=1776926902; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=3gxipPuQZqqP6lRhkjh3oxNL0Xk+PKMIt/WBu9r9Cc4=; b=GQIVdYAYovi277Q9tzcaU95yZ+7tbpaxi0Ge9tQcYijmW5LGYI3dZM5N1Z+HR1oS1E VrupdT0A5H7dqfMbfuJWph3OIWjgAnZ4fo1b+fT4BtGx6N5sQn8ENE8B0wjNS8TuJW4f cftoYGMM4ynWOJSac/E3Lp3YF8pnPSoNeHWk4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322102; x=1776926902; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=3gxipPuQZqqP6lRhkjh3oxNL0Xk+PKMIt/WBu9r9Cc4=; b=GAW7WhRTQm5M2hfql/tr3JV0e7mH7TH4sDLkBoFVj923C25XQ4hpyIsejaSo46HfDW YCWEm/fA+z+ftZit/hO62MI6Hp1ajcMFJ7RJx6hWGrrzBq5aERpPbe9CTifbkgM2BMlM TGO5lxtVXZP/OIyOBwYkQnf7gyNsxcyQ/N9gC2ChCgdFbaKhuVz6o6GPKXVSGf/xU6GT Q6MT1qkITF2y5HbF55VTont5PDlVRbwJF5EyVLuecDxahP5j8pTUACjn+jj8OWoc+6Zw EmqKfmVM6s5TcQa68OhVKHJLX/JBeY4SvMKx9ID1KoPxtuCI8HAqSRz3rfzLO/bx9QF+ b7vQ== X-Gm-Message-State: AOJu0YxkfaeG3gOv80E5CwWgy82LMEtRNVVn2RkvSKWC9oYFrmL60YS8 id5UFL6N2aZpMVMZPmSb6cSXF5PVxM7LbnvqR3XdBLiKWrGlrlYiTbxJ6K87j2GDPnavCEA8xNf b1W/eB934xnb6 X-Gm-Gg: AeBDietUKUMAlRQfw1cVHMXQgGXrhuxrxjVchOwo7Qq0BNLvlv0EJ3kI99mDx8mS7FT 9lOyvcEC5LuntaYrWlP80yw6fbPWjbznMxO9kS/l5DOGGdUp+n1C/S2vj6XBMJNDepnMlAu+Bk9 v0FwYA91Hf5dDNm1+M2B/v4IsvWTLHwAmRqf+GiERIrfOrbmSuy90kC2Xy6rWTO10HQr4budpGt CdTjFP9mPecjbtqET+T6VOGrhB1mz9RLl9UUGffNhG5KBQvLmnJU91WaOPoiXDfEZlHy4zVrS/G BZO3/RKKcjYknA8RuoGK38YUHKG8VeNDYNJrZP1FxyatNAAuNRfx1nApV15l/9ni+S+skOZbMcj cEeam/HuOAVMVPPhnYyj5IsdU03vKWrhwJkxhziuNfFmcfVL3/t4wYyVHazHlmd2sX2jxqf7U/O hzIDIT56PtXm+5u9s8btMt3RVOUmFQSjjTIYzwvNA6XlevqSKUD9AfsNoVLCHk7gCKRNRDUheOk qAIuubpT8bPNm2ZW3+4uG8EZEy+a9p8s/lYuJXArPvELJWE X-Received: by 2002:a5d:5d12:0:b0:439:ae2a:755e with SMTP id ffacd0b85a97d-43d642c4f2dmr38891193f8f.23.1776322101072; Wed, 15 Apr 2026 23:48:21 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.20 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:20 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 06/47] nfs-utils: Fix CVE-2025-12801 Date: Thu, 16 Apr 2026 08:47:07 +0200 Message-ID: <6d14141cb096391f1c0730cc509704784d194f2f.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235348 From: Deepak Rathore - This patch applies the upstream fix [1] as referenced in [5]. - To successfully apply the fixed commit, apply the dependent commits [2] to [4] which are included in v2.8.6, as referenced in [5]. - Reference: [1] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=f36bd900a899 [2] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=7e8b36522f58 [3] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=42f01e6a78fe [4] https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=51738ae56d92 [5] https://security-tracker.debian.org/tracker/CVE-2025-12801 Signed-off-by: Deepak Rathore [YC: fixed tab vs space indent in recipe patch] Signed-off-by: Yoann Congal --- .../CVE-2025-12801-dependent_p1.patch | 81 +++ .../CVE-2025-12801-dependent_p2.patch | 181 +++++++ .../CVE-2025-12801-dependent_p3.patch | 465 ++++++++++++++++++ .../nfs-utils/nfs-utils/CVE-2025-12801.patch | 254 ++++++++++ .../nfs-utils/nfs-utils_2.8.4.bb | 4 + 5 files changed, 985 insertions(+) create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch create mode 100644 meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch new file mode 100644 index 00000000000..8f2174c5b81 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p1.patch @@ -0,0 +1,81 @@ +From 0ea29d6077dacbf6a754b0e648275eec2a576e87 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Mon, 10 Nov 2025 11:26:03 -0500 +Subject: [PATCH 1/4] mountd: Minor refactor of get_rootfh() + +Perform the mountpoint checks before checking the user path. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=7e8b36522f58657359c6842119fc516c6dd1baa4] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Steve Dickson +(cherry picked from commit 7e8b36522f58657359c6842119fc516c6dd1baa4) +Signed-off-by: Deepak Rathore +--- + utils/mountd/mountd.c | 34 +++++++++++++++++----------------- + 1 file changed, 17 insertions(+), 17 deletions(-) + +diff --git a/utils/mountd/mountd.c b/utils/mountd/mountd.c +index dbd5546d..39afd4aa 100644 +--- a/utils/mountd/mountd.c ++++ b/utils/mountd/mountd.c +@@ -412,6 +412,23 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_ACCES; + return NULL; + } ++ if (nfsd_path_stat(exp->m_export.e_path, &estb) < 0) { ++ xlog(L_WARNING, "can't stat export point %s: %s", ++ p, strerror(errno)); ++ *error = MNT3ERR_NOENT; ++ return NULL; ++ } ++ if (exp->m_export.e_mountpoint && ++ !check_is_mountpoint(exp->m_export.e_mountpoint[0]? ++ exp->m_export.e_mountpoint: ++ exp->m_export.e_path, ++ nfsd_path_lstat)) { ++ xlog(L_WARNING, "request to export an unmounted filesystem: %s", ++ p); ++ *error = MNT3ERR_NOENT; ++ return NULL; ++ } ++ + if (nfsd_path_stat(p, &stb) < 0) { + xlog(L_WARNING, "can't stat exported dir %s: %s", + p, strerror(errno)); +@@ -426,12 +443,6 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_NOTDIR; + return NULL; + } +- if (nfsd_path_stat(exp->m_export.e_path, &estb) < 0) { +- xlog(L_WARNING, "can't stat export point %s: %s", +- p, strerror(errno)); +- *error = MNT3ERR_NOENT; +- return NULL; +- } + if (estb.st_dev != stb.st_dev + && !(exp->m_export.e_flags & NFSEXP_CROSSMOUNT)) { + xlog(L_WARNING, "request to export directory %s below nearest filesystem %s", +@@ -439,17 +450,6 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_ACCES; + return NULL; + } +- if (exp->m_export.e_mountpoint && +- !check_is_mountpoint(exp->m_export.e_mountpoint[0]? +- exp->m_export.e_mountpoint: +- exp->m_export.e_path, +- nfsd_path_lstat)) { +- xlog(L_WARNING, "request to export an unmounted filesystem: %s", +- p); +- *error = MNT3ERR_NOENT; +- return NULL; +- } +- + /* This will be a static private nfs_export with just one + * address. We feed it to kernel then extract the filehandle, + */ +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch new file mode 100644 index 00000000000..e078ddd0e86 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p2.patch @@ -0,0 +1,181 @@ +From 8a19b1f0dd1f09d440a6a94748fe403f7ef8da81 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Mon, 10 Nov 2025 11:28:39 -0500 +Subject: [PATCH 2/4] mountd: Separate lookup of the exported directory and the + mount path + +When the caller asks to mount a path that does not terminate with an +exported directory, we want to split up the lookups so that we can +look up the exported directory using the mountd privileged credential, +and the remaining subdirectory lookups using the RPC caller's +credential. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=42f01e6a78fed98f12437ac8b28cfb12b6bad056] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Steve Dickson +(cherry picked from commit 42f01e6a78fed98f12437ac8b28cfb12b6bad056) +Signed-off-by: Deepak Rathore +--- + support/include/nfsd_path.h | 1 + + support/misc/nfsd_path.c | 31 ++++++++++++++++++ + utils/mountd/mountd.c | 63 +++++++++++++++++++++++++++++++------ + 3 files changed, 86 insertions(+), 9 deletions(-) + +diff --git a/support/include/nfsd_path.h b/support/include/nfsd_path.h +index f600fb5a..3e5a2f5d 100644 +--- a/support/include/nfsd_path.h ++++ b/support/include/nfsd_path.h +@@ -18,6 +18,7 @@ char * nfsd_path_prepend_dir(const char *dir, const char *pathname); + + int nfsd_path_stat(const char *pathname, struct stat *statbuf); + int nfsd_path_lstat(const char *pathname, struct stat *statbuf); ++int nfsd_openat(int dirfd, const char *path, int flags); + + int nfsd_path_statfs(const char *pathname, + struct statfs *statbuf); +diff --git a/support/misc/nfsd_path.c b/support/misc/nfsd_path.c +index caec33ca..dfe88e4f 100644 +--- a/support/misc/nfsd_path.c ++++ b/support/misc/nfsd_path.c +@@ -203,6 +203,37 @@ nfsd_realpath(const char *path, char *resolved_buf) + return realpath_buf.res_ptr; + } + ++struct nfsd_openat_t { ++ const char *path; ++ int dirfd; ++ int flags; ++ int res_fd; ++ int res_error; ++}; ++ ++static void nfsd_openatfunc(void *data) ++{ ++ struct nfsd_openat_t *d = data; ++ ++ d->res_fd = openat(d->dirfd, d->path, d->flags); ++ if (d->res_fd == -1) ++ d->res_error = errno; ++} ++ ++int nfsd_openat(int dirfd, const char *path, int flags) ++{ ++ struct nfsd_openat_t open_buf = { ++ .path = path, ++ .dirfd = dirfd, ++ .flags = flags, ++ }; ++ ++ nfsd_run_task(nfsd_openatfunc, &open_buf); ++ if (open_buf.res_fd == -1) ++ errno = open_buf.res_error; ++ return open_buf.res_fd; ++} ++ + struct nfsd_rw_data { + int fd; + void* buf; +diff --git a/utils/mountd/mountd.c b/utils/mountd/mountd.c +index 39afd4aa..f43ebef5 100644 +--- a/utils/mountd/mountd.c ++++ b/utils/mountd/mountd.c +@@ -392,7 +392,10 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + struct nfs_fh_len *fh; + char rpath[MAXPATHLEN+1]; + char *p = *path; ++ char *subpath; + char buf[INET6_ADDRSTRLEN]; ++ size_t epathlen; ++ int dirfd; + + if (*p == '\0') + p = "/"; +@@ -412,12 +415,21 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + *error = MNT3ERR_ACCES; + return NULL; + } +- if (nfsd_path_stat(exp->m_export.e_path, &estb) < 0) { +- xlog(L_WARNING, "can't stat export point %s: %s", ++ ++ dirfd = nfsd_openat(AT_FDCWD, exp->m_export.e_path, O_PATH); ++ if (dirfd == -1) { ++ xlog(L_WARNING, "can't open export point %s: %s", + p, strerror(errno)); + *error = MNT3ERR_NOENT; + return NULL; + } ++ if (fstat(dirfd, &estb) == -1) { ++ xlog(L_WARNING, "can't stat export point %s: %s", ++ p, strerror(errno)); ++ *error = MNT3ERR_ACCES; ++ close(dirfd); ++ return NULL; ++ } + if (exp->m_export.e_mountpoint && + !check_is_mountpoint(exp->m_export.e_mountpoint[0]? + exp->m_export.e_mountpoint: +@@ -426,18 +438,51 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + xlog(L_WARNING, "request to export an unmounted filesystem: %s", + p); + *error = MNT3ERR_NOENT; ++ close(dirfd); + return NULL; + } + +- if (nfsd_path_stat(p, &stb) < 0) { +- xlog(L_WARNING, "can't stat exported dir %s: %s", +- p, strerror(errno)); +- if (errno == ENOENT) +- *error = MNT3ERR_NOENT; +- else +- *error = MNT3ERR_ACCES; ++ epathlen = strlen(exp->m_export.e_path); ++ if (epathlen > strlen(p)) { ++ xlog(L_WARNING, "raced with change of exported path: %s", p); ++ *error = MNT3ERR_NOENT; ++ close(dirfd); + return NULL; + } ++ subpath = &p[epathlen]; ++ while (*subpath == '/') ++ subpath++; ++ if (*subpath != '\0') { ++ int fd; ++ ++ /* Just perform a lookup of the path */ ++ fd = nfsd_openat(dirfd, subpath, O_PATH); ++ close(dirfd); ++ if (fd == -1) { ++ xlog(L_WARNING, "can't open exported dir %s: %s", p, ++ strerror(errno)); ++ if (errno == ENOENT) ++ *error = MNT3ERR_NOENT; ++ else ++ *error = MNT3ERR_ACCES; ++ return NULL; ++ } ++ if (fstat(fd, &stb) == -1) { ++ xlog(L_WARNING, "can't open exported dir %s: %s", p, ++ strerror(errno)); ++ if (errno == ENOENT) ++ *error = MNT3ERR_NOENT; ++ else ++ *error = MNT3ERR_ACCES; ++ close(fd); ++ return NULL; ++ } ++ close(fd); ++ } else { ++ close(dirfd); ++ stb = estb; ++ } ++ + if (!S_ISDIR(stb.st_mode) && !S_ISREG(stb.st_mode)) { + xlog(L_WARNING, "%s is not a directory or regular file", p); + *error = MNT3ERR_NOTDIR; +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch new file mode 100644 index 00000000000..7c9a1e6d2bc --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801-dependent_p3.patch @@ -0,0 +1,465 @@ +From 0114ef262d61988b8209b7baab7426eac9a49548 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Mon, 10 Nov 2025 12:18:38 -0500 +Subject: [PATCH 3/4] support: Add a mini-library to extract and apply RPC + credentials + +Add server functionality to extract the credentials from the client RPC +call, and apply them. This is needed in order to perform access checking +on the requested path in the mountd daemon. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=51738ae56d922d4961e60dad73ad1c2d97d8d99b] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Steve Dickson +(cherry picked from commit 51738ae56d922d4961e60dad73ad1c2d97d8d99b) +Signed-off-by: Deepak Rathore +--- + aclocal/libtirpc.m4 | 12 +++ + support/include/Makefile.am | 1 + + support/include/nfs_ucred.h | 44 ++++++++++ + support/misc/Makefile.am | 2 +- + support/misc/ucred.c | 162 ++++++++++++++++++++++++++++++++++++ + support/nfs/Makefile.am | 2 +- + support/nfs/ucred.c | 147 ++++++++++++++++++++++++++++++++ + 7 files changed, 368 insertions(+), 2 deletions(-) + create mode 100644 support/include/nfs_ucred.h + create mode 100644 support/misc/ucred.c + create mode 100644 support/nfs/ucred.c + +diff --git a/aclocal/libtirpc.m4 b/aclocal/libtirpc.m4 +index ef48a2ae..06629db9 100644 +--- a/aclocal/libtirpc.m4 ++++ b/aclocal/libtirpc.m4 +@@ -31,6 +31,18 @@ AC_DEFUN([AC_LIBTIRPC], [ + [AC_DEFINE([HAVE_TIRPC_GSS_SECCREATE], [1], + [Define to 1 if your tirpc library provides rpc_gss_seccreate])],, + [${LIBS}])]) ++ ++ AS_IF([test -n "${LIBTIRPC}"], ++ [AC_CHECK_LIB([tirpc], [rpc_gss_getcred], ++ [AC_DEFINE([HAVE_TIRPC_GSS_GETCRED], [1], ++ [Define to 1 if your tirpc library provides rpc_gss_getcred])],, ++ [${LIBS}])]) ++ ++ AS_IF([test -n "${LIBTIRPC}"], ++ [AC_CHECK_LIB([tirpc], [authdes_getucred], ++ [AC_DEFINE([HAVE_TIRPC_AUTHDES_GETUCRED], [1], ++ [Define to 1 if your tirpc library provides authdes_getucred])],, ++ [${LIBS}])]) + AC_SUBST([AM_CPPFLAGS]) + AC_SUBST(LIBTIRPC) + +diff --git a/support/include/Makefile.am b/support/include/Makefile.am +index 1373891a..631a84f8 100644 +--- a/support/include/Makefile.am ++++ b/support/include/Makefile.am +@@ -10,6 +10,7 @@ noinst_HEADERS = \ + misc.h \ + nfs_mntent.h \ + nfs_paths.h \ ++ nfs_ucred.h \ + nfsd_path.h \ + nfslib.h \ + nfsrpc.h \ +diff --git a/support/include/nfs_ucred.h b/support/include/nfs_ucred.h +new file mode 100644 +index 00000000..d58b61e4 +--- /dev/null ++++ b/support/include/nfs_ucred.h +@@ -0,0 +1,44 @@ ++#ifndef _NFS_UCRED_H ++#define _NFS_UCRED_H ++ ++#include ++ ++struct nfs_ucred { ++ uid_t uid; ++ gid_t gid; ++ int ngroups; ++ gid_t *groups; ++}; ++ ++struct svc_req; ++struct exportent; ++ ++int nfs_ucred_get(struct nfs_ucred **credp, struct svc_req *rqst, ++ const struct exportent *ep); ++ ++void nfs_ucred_squash_groups(struct nfs_ucred *cred, ++ const struct exportent *ep); ++int nfs_ucred_reload_groups(struct nfs_ucred *cred, const struct exportent *ep); ++int nfs_ucred_swap_effective(const struct nfs_ucred *cred, ++ struct nfs_ucred **savedp); ++ ++static inline void nfs_ucred_free(struct nfs_ucred *cred) ++{ ++ free(cred->groups); ++ free(cred); ++} ++ ++static inline void nfs_ucred_init_groups(struct nfs_ucred *cred, gid_t *groups, ++ int ngroups) ++{ ++ cred->groups = groups; ++ cred->ngroups = ngroups; ++} ++ ++static inline void nfs_ucred_free_groups(struct nfs_ucred *cred) ++{ ++ free(cred->groups); ++ nfs_ucred_init_groups(cred, NULL, 0); ++} ++ ++#endif /* _NFS_UCRED_H */ +diff --git a/support/misc/Makefile.am b/support/misc/Makefile.am +index f9993e3a..7ea2d798 100644 +--- a/support/misc/Makefile.am ++++ b/support/misc/Makefile.am +@@ -2,6 +2,6 @@ + + noinst_LIBRARIES = libmisc.a + libmisc_a_SOURCES = tcpwrapper.c from_local.c mountpoint.c file.c \ +- nfsd_path.c workqueue.c xstat.c ++ nfsd_path.c ucred.c workqueue.c xstat.c + + MAINTAINERCLEANFILES = Makefile.in +diff --git a/support/misc/ucred.c b/support/misc/ucred.c +new file mode 100644 +index 00000000..92d97912 +--- /dev/null ++++ b/support/misc/ucred.c +@@ -0,0 +1,162 @@ ++#ifdef HAVE_CONFIG_H ++#include ++#endif ++ ++#include ++#include ++#include ++#include ++#include ++#include ++ ++#include "exportfs.h" ++#include "nfs_ucred.h" ++ ++#include "xlog.h" ++ ++void nfs_ucred_squash_groups(struct nfs_ucred *cred, const struct exportent *ep) ++{ ++ int i; ++ ++ if (!(ep->e_flags & NFSEXP_ROOTSQUASH)) ++ return; ++ if (cred->gid == 0) ++ cred->gid = ep->e_anongid; ++ for (i = 0; i < cred->ngroups; i++) { ++ if (cred->groups[i] == 0) ++ cred->groups[i] = ep->e_anongid; ++ } ++} ++ ++static int nfs_ucred_init_effective(struct nfs_ucred *cred) ++{ ++ int ngroups = getgroups(0, NULL); ++ ++ if (ngroups > 0) { ++ size_t sz = ngroups * sizeof(gid_t); ++ gid_t *groups = malloc(sz); ++ if (groups == NULL) ++ return ENOMEM; ++ if (getgroups(ngroups, groups) == -1) { ++ free(groups); ++ return errno; ++ } ++ nfs_ucred_init_groups(cred, groups, ngroups); ++ } else ++ nfs_ucred_init_groups(cred, NULL, 0); ++ cred->uid = geteuid(); ++ cred->gid = getegid(); ++ return 0; ++} ++ ++static size_t nfs_ucred_getpw_r_size_max(void) ++{ ++ long buflen = sysconf(_SC_GETPW_R_SIZE_MAX); ++ ++ if (buflen == -1) ++ return 16384; ++ return buflen; ++} ++ ++int nfs_ucred_reload_groups(struct nfs_ucred *cred, const struct exportent *ep) ++{ ++ struct passwd pwd, *pw; ++ uid_t uid = cred->uid; ++ gid_t gid = cred->gid; ++ size_t buflen; ++ char *buf; ++ int ngroups = 0; ++ int ret; ++ ++ if (ep->e_flags & (NFSEXP_ALLSQUASH | NFSEXP_ROOTSQUASH) && ++ (int)uid == ep->e_anonuid) ++ return 0; ++ buflen = nfs_ucred_getpw_r_size_max(); ++ buf = alloca(buflen); ++ ret = getpwuid_r(uid, &pwd, buf, buflen, &pw); ++ if (ret != 0) ++ return ret; ++ if (!pw) ++ return ENOENT; ++ if (getgrouplist(pw->pw_name, gid, NULL, &ngroups) == -1 && ++ ngroups > 0) { ++ gid_t *groups = malloc(ngroups * sizeof(groups[0])); ++ if (groups == NULL) ++ return ENOMEM; ++ if (getgrouplist(pw->pw_name, gid, groups, &ngroups) == -1) { ++ free(groups); ++ return ENOMEM; ++ } ++ free(cred->groups); ++ nfs_ucred_init_groups(cred, groups, ngroups); ++ nfs_ucred_squash_groups(cred, ep); ++ } else ++ nfs_ucred_free_groups(cred); ++ return 0; ++} ++ ++static int nfs_ucred_set_effective(const struct nfs_ucred *cred, ++ const struct nfs_ucred *saved) ++{ ++ uid_t suid = saved ? saved->uid : geteuid(); ++ gid_t sgid = saved ? saved->gid : getegid(); ++ int ret; ++ ++ /* Start with a privileged effective user */ ++ if (setresuid(-1, 0, -1) < 0) { ++ xlog(L_WARNING, "can't change privileged user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ return errno; ++ } ++ ++ if (setgroups(cred->ngroups, cred->groups) == -1) { ++ xlog(L_WARNING, "can't change groups for user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ return errno; ++ } ++ if (setresgid(-1, cred->gid, sgid) == -1) { ++ xlog(L_WARNING, "can't change gid for user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ ret = errno; ++ goto restore_groups; ++ } ++ if (setresuid(-1, cred->uid, suid) == -1) { ++ xlog(L_WARNING, "can't change uid for user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ ret = errno; ++ goto restore_gid; ++ } ++ return 0; ++restore_gid: ++ if (setresgid(-1, sgid, -1) < 0) { ++ xlog(L_WARNING, "can't restore privileged user %u-%u. %s", ++ geteuid(), getegid(), strerror(errno)); ++ } ++restore_groups: ++ if (saved) ++ setgroups(saved->ngroups, saved->groups); ++ else ++ setgroups(0, NULL); ++ return ret; ++} ++ ++int nfs_ucred_swap_effective(const struct nfs_ucred *cred, ++ struct nfs_ucred **savedp) ++{ ++ struct nfs_ucred *saved = malloc(sizeof(*saved)); ++ int ret; ++ ++ if (saved == NULL) ++ return ENOMEM; ++ ret = nfs_ucred_init_effective(saved); ++ if (ret != 0) { ++ free(saved); ++ return ret; ++ } ++ ret = nfs_ucred_set_effective(cred, saved); ++ if (savedp == NULL || ret != 0) ++ nfs_ucred_free(saved); ++ else ++ *savedp = saved; ++ return ret; ++} +diff --git a/support/nfs/Makefile.am b/support/nfs/Makefile.am +index 2e1577cc..f6921265 100644 +--- a/support/nfs/Makefile.am ++++ b/support/nfs/Makefile.am +@@ -7,7 +7,7 @@ libnfs_la_SOURCES = exports.c rmtab.c xio.c rpcmisc.c rpcdispatch.c \ + xcommon.c wildmat.c mydaemon.c \ + rpc_socket.c getport.c \ + svc_socket.c cacheio.c closeall.c nfs_mntent.c \ +- svc_create.c atomicio.c strlcat.c strlcpy.c ++ svc_create.c atomicio.c strlcat.c strlcpy.c ucred.c + libnfs_la_LIBADD = libnfsconf.la + libnfs_la_CPPFLAGS = $(AM_CPPFLAGS) $(CPPFLAGS) -I$(top_srcdir)/support/reexport + +diff --git a/support/nfs/ucred.c b/support/nfs/ucred.c +new file mode 100644 +index 00000000..6ea8efdf +--- /dev/null ++++ b/support/nfs/ucred.c +@@ -0,0 +1,147 @@ ++#ifdef HAVE_CONFIG_H ++#include ++#endif ++ ++#include ++#include ++#include ++#include ++ ++#include "exportfs.h" ++#include "nfs_ucred.h" ++ ++#ifdef HAVE_TIRPC_GSS_GETCRED ++#include ++#endif /* HAVE_TIRPC_GSS_GETCRED */ ++#ifdef HAVE_TIRPC_AUTHDES_GETUCRED ++#include ++#endif /* HAVE_TIRPC_AUTHDES_GETUCRED */ ++ ++static int nfs_ucred_copy_cred(struct nfs_ucred *cred, uid_t uid, gid_t gid, ++ const gid_t *groups, int ngroups) ++{ ++ if (ngroups > 0) { ++ size_t sz = ngroups * sizeof(groups[0]); ++ cred->groups = malloc(sz); ++ if (cred->groups == NULL) ++ return ENOMEM; ++ cred->ngroups = ngroups; ++ memcpy(cred->groups, groups, sz); ++ } else ++ nfs_ucred_init_groups(cred, NULL, 0); ++ cred->uid = uid; ++ cred->gid = gid; ++ return 0; ++} ++ ++static int nfs_ucred_init_cred_squashed(struct nfs_ucred *cred, ++ const struct exportent *ep) ++{ ++ cred->uid = ep->e_anonuid; ++ cred->gid = ep->e_anongid; ++ nfs_ucred_init_groups(cred, NULL, 0); ++ return 0; ++} ++ ++static int nfs_ucred_init_cred(struct nfs_ucred *cred, uid_t uid, gid_t gid, ++ const gid_t *groups, int ngroups, ++ const struct exportent *ep) ++{ ++ if (ep->e_flags & NFSEXP_ALLSQUASH) { ++ nfs_ucred_init_cred_squashed(cred, ep); ++ } else if (ep->e_flags & NFSEXP_ROOTSQUASH && uid == 0) { ++ nfs_ucred_init_cred_squashed(cred, ep); ++ if (gid != 0) ++ cred->gid = gid; ++ } else { ++ int ret = nfs_ucred_copy_cred(cred, uid, gid, groups, ngroups); ++ if (ret != 0) ++ return ret; ++ nfs_ucred_squash_groups(cred, ep); ++ } ++ return 0; ++} ++ ++static int nfs_ucred_init_null(struct nfs_ucred *cred, ++ const struct exportent *ep) ++{ ++ return nfs_ucred_init_cred_squashed(cred, ep); ++} ++ ++static int nfs_ucred_init_unix(struct nfs_ucred *cred, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ struct authunix_parms *aup; ++ ++ aup = (struct authunix_parms *)rqst->rq_clntcred; ++ return nfs_ucred_init_cred(cred, aup->aup_uid, aup->aup_gid, ++ aup->aup_gids, aup->aup_len, ep); ++} ++ ++#ifdef HAVE_TIRPC_GSS_GETCRED ++static int nfs_ucred_init_gss(struct nfs_ucred *cred, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ rpc_gss_ucred_t *gss_ucred = NULL; ++ ++ if (!rpc_gss_getcred(rqst, NULL, &gss_ucred, NULL) || gss_ucred == NULL) ++ return EINVAL; ++ return nfs_ucred_init_cred(cred, gss_ucred->uid, gss_ucred->gid, ++ gss_ucred->gidlist, gss_ucred->gidlen, ep); ++} ++#endif /* HAVE_TIRPC_GSS_GETCRED */ ++ ++#ifdef HAVE_TIRPC_AUTHDES_GETUCRED ++int authdes_getucred(struct authdes_cred *adc, uid_t *uid, gid_t *gid, ++ int *grouplen, gid_t *groups); ++ ++static int nfs_ucred_init_des(struct nfs_ucred *cred, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ struct authdes_cred *des_cred; ++ uid_t uid; ++ gid_t gid; ++ int grouplen; ++ gid_t groups[NGROUPS]; ++ ++ des_cred = (struct authdes_cred *)rqst->rq_clntcred; ++ if (!authdes_getucred(des_cred, &uid, &gid, &grouplen, &groups[0])) ++ return EINVAL; ++ return nfs_ucred_init_cred(cred, uid, gid, groups, grouplen, ep); ++} ++#endif /* HAVE_TIRPC_AUTHDES_GETUCRED */ ++ ++int nfs_ucred_get(struct nfs_ucred **credp, struct svc_req *rqst, ++ const struct exportent *ep) ++{ ++ struct nfs_ucred *cred = malloc(sizeof(*cred)); ++ int ret; ++ ++ *credp = NULL; ++ if (cred == NULL) ++ return ENOMEM; ++ switch (rqst->rq_cred.oa_flavor) { ++ case AUTH_UNIX: ++ ret = nfs_ucred_init_unix(cred, rqst, ep); ++ break; ++#ifdef HAVE_TIRPC_GSS_GETCRED ++ case RPCSEC_GSS: ++ ret = nfs_ucred_init_gss(cred, rqst, ep); ++ break; ++#endif /* HAVE_TIRPC_GSS_GETCRED */ ++#ifdef HAVE_TIRPC_AUTHDES_GETUCRED ++ case AUTH_DES: ++ ret = nfs_ucred_init_des(cred, rqst, ep); ++ break; ++#endif /* HAVE_TIRPC_AUTHDES_GETUCRED */ ++ default: ++ ret = nfs_ucred_init_null(cred, ep); ++ break; ++ } ++ if (ret == 0) { ++ *credp = cred; ++ return 0; ++ } ++ free(cred); ++ return ret; ++} +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch new file mode 100644 index 00000000000..23e18ffdab4 --- /dev/null +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils/CVE-2025-12801.patch @@ -0,0 +1,254 @@ +From 6dc289e68d8432eb4fc4f397fed28435bf600bb1 Mon Sep 17 00:00:00 2001 +From: Trond Myklebust +Date: Thu, 5 Mar 2026 10:41:02 -0500 +Subject: [PATCH 4/4] Fix access checks when mounting subdirectories in NFSv3 + +If a NFSv3 client asks to mount a subdirectory of one of the exported +directories, then apply the RPC credential together with any root +or all squash rules that would apply to the client in question. + +CVE: CVE-2025-12801 +Upstream-Status: Backport [https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=f36bd900a899088ca1925de079bd58d6205a1f3c] + +Reviewed-by: Jeff Layton +Signed-off-by: Trond Myklebust +Signed-off-by: Scott Mayhew +Signed-off-by: Steve Dickson +(cherry picked from commit f36bd900a899088ca1925de079bd58d6205a1f3c) +Signed-off-by: Deepak Rathore +--- + nfs.conf | 1 + + support/include/nfsd_path.h | 9 ++++++++- + support/misc/nfsd_path.c | 32 ++++++++++++++++++++++++++++++-- + utils/mountd/mountd.c | 28 ++++++++++++++++++++++++++-- + utils/mountd/mountd.man | 26 ++++++++++++++++++++++++++ + 5 files changed, 91 insertions(+), 5 deletions(-) + +diff --git a/nfs.conf b/nfs.conf +index 3cca68c3..ddf0c143 100644 +--- a/nfs.conf ++++ b/nfs.conf +@@ -46,6 +46,7 @@ + # ttl=1800 + [mountd] + # debug="all|auth|call|general|parse" ++# apply-root-cred=n + # manage-gids=n + # descriptors=0 + # port=0 +diff --git a/support/include/nfsd_path.h b/support/include/nfsd_path.h +index 3e5a2f5d..06c0f2f4 100644 +--- a/support/include/nfsd_path.h ++++ b/support/include/nfsd_path.h +@@ -9,6 +9,7 @@ + struct file_handle; + struct statfs; + struct nfsd_task_t; ++struct nfs_ucred; + + void nfsd_path_init(void); + +@@ -18,7 +19,8 @@ char * nfsd_path_prepend_dir(const char *dir, const char *pathname); + + int nfsd_path_stat(const char *pathname, struct stat *statbuf); + int nfsd_path_lstat(const char *pathname, struct stat *statbuf); +-int nfsd_openat(int dirfd, const char *path, int flags); ++int nfsd_cred_openat(const struct nfs_ucred *cred, int dirfd, ++ const char *path, int flags); + + int nfsd_path_statfs(const char *pathname, + struct statfs *statbuf); +@@ -31,4 +33,9 @@ ssize_t nfsd_path_write(int fd, void* buf, size_t len); + int nfsd_name_to_handle_at(int fd, const char *path, + struct file_handle *fh, + int *mount_id, int flags); ++ ++static inline int nfsd_openat(int dirfd, const char *path, int flags) ++{ ++ return nfsd_cred_openat(NULL, dirfd, path, flags); ++} + #endif +diff --git a/support/misc/nfsd_path.c b/support/misc/nfsd_path.c +index dfe88e4f..6466666d 100644 +--- a/support/misc/nfsd_path.c ++++ b/support/misc/nfsd_path.c +@@ -17,6 +17,7 @@ + #include "xstat.h" + #include "nfslib.h" + #include "nfsd_path.h" ++#include "nfs_ucred.h" + #include "workqueue.h" + + static struct xthread_workqueue *nfsd_wq = NULL; +@@ -204,6 +205,7 @@ nfsd_realpath(const char *path, char *resolved_buf) + } + + struct nfsd_openat_t { ++ const struct nfs_ucred *cred; + const char *path; + int dirfd; + int flags; +@@ -220,15 +222,41 @@ static void nfsd_openatfunc(void *data) + d->res_error = errno; + } + +-int nfsd_openat(int dirfd, const char *path, int flags) ++static void nfsd_cred_openatfunc(void *data) ++{ ++ struct nfsd_openat_t *d = data; ++ struct nfs_ucred *saved = NULL; ++ int ret; ++ ++ ret = nfs_ucred_swap_effective(d->cred, &saved); ++ if (ret != 0) { ++ d->res_fd = -1; ++ d->res_error = ret; ++ return; ++ } ++ ++ nfsd_openatfunc(data); ++ ++ if (saved != NULL) { ++ nfs_ucred_swap_effective(saved, NULL); ++ nfs_ucred_free(saved); ++ } ++} ++ ++int nfsd_cred_openat(const struct nfs_ucred *cred, int dirfd, const char *path, ++ int flags) + { + struct nfsd_openat_t open_buf = { ++ .cred = cred, + .path = path, + .dirfd = dirfd, + .flags = flags, + }; + +- nfsd_run_task(nfsd_openatfunc, &open_buf); ++ if (cred) ++ nfsd_run_task(nfsd_cred_openatfunc, &open_buf); ++ else ++ nfsd_run_task(nfsd_openatfunc, &open_buf); + if (open_buf.res_fd == -1) + errno = open_buf.res_error; + return open_buf.res_fd; +diff --git a/utils/mountd/mountd.c b/utils/mountd/mountd.c +index f43ebef5..6e6777cd 100644 +--- a/utils/mountd/mountd.c ++++ b/utils/mountd/mountd.c +@@ -31,6 +31,7 @@ + #include "nfsd_path.h" + #include "nfslib.h" + #include "export.h" ++#include "nfs_ucred.h" + + extern void my_svc_run(void); + +@@ -40,6 +41,7 @@ static struct nfs_fh_len *get_rootfh(struct svc_req *, dirpath *, nfs_export **, + + int reverse_resolve = 0; + int manage_gids; ++int apply_root_cred; + int use_ipaddr = -1; + + /* PRC: a high-availability callout program can be specified with -H +@@ -74,9 +76,10 @@ static struct option longopts[] = + { "log-auth", 0, 0, 'l'}, + { "cache-use-ipaddr", 0, 0, 'i'}, + { "ttl", 1, 0, 'T'}, ++ { "apply-root-cred", 0, 0, 'c' }, + { NULL, 0, 0, 0 } + }; +-static char shortopts[] = "o:nFd:p:P:hH:N:V:vurs:t:gliT:"; ++static char shortopts[] = "o:nFd:p:P:hH:N:V:vurs:t:gliT:c"; + + #define NFSVERSBIT(vers) (0x1 << (vers - 1)) + #define NFSVERSBIT_ALL (NFSVERSBIT(2) | NFSVERSBIT(3) | NFSVERSBIT(4)) +@@ -453,11 +456,27 @@ get_rootfh(struct svc_req *rqstp, dirpath *path, nfs_export **expret, + while (*subpath == '/') + subpath++; + if (*subpath != '\0') { ++ struct nfs_ucred *cred = NULL; + int fd; + ++ /* Load the user cred */ ++ if (!apply_root_cred) { ++ nfs_ucred_get(&cred, rqstp, &exp->m_export); ++ if (cred == NULL) { ++ xlog(L_WARNING, "can't retrieve credential"); ++ *error = MNT3ERR_ACCES; ++ close(dirfd); ++ return NULL; ++ } ++ if (manage_gids) ++ nfs_ucred_reload_groups(cred, &exp->m_export); ++ } ++ + /* Just perform a lookup of the path */ +- fd = nfsd_openat(dirfd, subpath, O_PATH); ++ fd = nfsd_cred_openat(cred, dirfd, subpath, O_PATH); + close(dirfd); ++ if (cred) ++ nfs_ucred_free(cred); + if (fd == -1) { + xlog(L_WARNING, "can't open exported dir %s: %s", p, + strerror(errno)); +@@ -681,6 +700,8 @@ read_mountd_conf(char **argv) + ttl = conf_get_num("mountd", "ttl", default_ttl); + if (ttl > 0) + default_ttl = ttl; ++ apply_root_cred = conf_get_bool("mountd", "apply-root-cred", ++ apply_root_cred); + } + + int +@@ -794,6 +815,9 @@ main(int argc, char **argv) + } + default_ttl = ttl; + break; ++ case 'c': ++ apply_root_cred = 1; ++ break; + case 0: + break; + case '?': +diff --git a/utils/mountd/mountd.man b/utils/mountd/mountd.man +index a206a3e2..f4f1fc23 100644 +--- a/utils/mountd/mountd.man ++++ b/utils/mountd/mountd.man +@@ -242,6 +242,32 @@ can support both NFS version 2 and the newer version 3. + Print the version of + .B rpc.mountd + and exit. ++.TP ++.B \-c " or " \-\-apply-root-cred ++When mountd is asked to allow a NFSv3 mount to a subdirectory of the ++exported directory, then it will check if the user asking to mount has ++lookup rights to the directories below that exported directory. When ++performing the check, mountd will apply any root squash or all squash ++rules that were specified for that client. ++ ++Performing lookup checks as the user requires that the mountd daemon ++be run as root or that it be given CAP_SETUID and CAP_SETGID privileges ++so that it can change its own effective user and effective group settings. ++When troubleshooting, please also note that LSM frameworks such as SELinux ++can sometimes prevent the daemon from changing the effective user/groups ++despite the capability settings. ++ ++In earlier versions of mountd, the same checks were performed using the ++mountd daemon's root privileges, meaning that it could authorise access ++to directories that are not normally accessible to the user requesting ++to mount them. This option enables that legacy behaviour. ++ ++.BR Note: ++If there is a need to provide access to specific subdirectories that ++are not normally accessible to a client, it is always possible to add ++export entries that explicitly grant such access. That ability does ++not depend on this option being enabled. ++ + .TP + .B \-g " or " \-\-manage-gids + Accept requests from the kernel to map user id numbers into lists of +-- +2.35.6 + diff --git a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb index 08e7dd89003..04f65fdff38 100644 --- a/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb +++ b/meta/recipes-connectivity/nfs-utils/nfs-utils_2.8.4.bb @@ -24,6 +24,10 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/nfs-utils/${PV}/nfs-utils-${PV}.tar.x file://0001-locktest-Makefile.am-Do-not-use-build-flags.patch \ file://0004-Use-nogroup-for-nobody-group.patch \ file://0005-find-OE-provided-Kerberos.patch \ + file://CVE-2025-12801-dependent_p1.patch \ + file://CVE-2025-12801-dependent_p2.patch \ + file://CVE-2025-12801-dependent_p3.patch \ + file://CVE-2025-12801.patch \ " SRC_URI[sha256sum] = "11c4cc598a434d7d340bad3e072a373ba1dcc2c49f855d44b202222b78ecdbf5" From patchwork Thu Apr 16 06:47:08 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86216 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F3A40F88072 for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7572.1776322103926353249 for ; Wed, 15 Apr 2026 23:48:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ZBDsHByl; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43d6fbd0954so3445609f8f.1 for ; Wed, 15 Apr 2026 23:48:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322102; x=1776926902; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WaYkrZqYD3QKvU1M3QQz1qp/jXduDv3dzKI5FWKlIdw=; b=ZBDsHBylGiysHYjP8JE0rblyoKXAaf8B3pNuQ94agK5TqKhs9HUcd4Ms9idOzGR6dS vjtgUhL8RmSVAT0oHWKp2slDVuo7wQwEnllCnctghO1xDYWDUb45QCwAlb90ZjgDlcTy 8MEjew81EM40wXylp46VJwlkkblv1PWgj+Tz4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322102; x=1776926902; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WaYkrZqYD3QKvU1M3QQz1qp/jXduDv3dzKI5FWKlIdw=; b=pm6s7GjG/bUn70DateTCGmNVUqvJP7BAoraZbRERHkZ/gTK0MMlaDyA1jUJpkWNFzS xaU3JIyQcP6sM8Ki5U3mjolBV4nrpqR7PqAmTOhciIVqSl2CnWhyXMtBWOtZKYuGvNIG dgDjIJKdMX4yz8OJuhlmdTfjXbLadvHU3gIbE7eVgTAcmFWxu91CpIMzOl0EQ68sV7J0 8s55xSLr36zLIy6mbGBv3AFZq8/Tg+aj8V7GirGbPmrKpMwozaG9167DE8mKySGz6Zpb 5GJZazxd4HxrQmgYBnlZy0Z4ZM7aXGN3qOz5lYFPtZYWLJoGnnwaW4XMGrfG9PYGpL9Q 1mZQ== X-Gm-Message-State: AOJu0YxCxfab623YGt+R0NK/GVpgNPFtvOLmhGrNqgS8eaTpPb920Auv OuPQABnwe9NOVf8w2IN1nBtB3yP7bGakGn+lfbOOHl20IfI68th9rN9bdgeu/KypHFau1x414qN JkyNvkz9mm4fF X-Gm-Gg: AeBDies3YQnKlsTCsEYxzDX5LfkHGNwrLfebmbpafullc9mjCi5e+OcHxbBfzbFQ4vb KHrfCHh399NEAULbnIgFXI9y+EgVVVub8Gq/IUt4wT/LI0ehuxbplsQcN05cOxE28x8NjgGJhnD eHB+iurGsAtSKjPyCVxcsri2JgP0MCBc5eecHD0NDmQRTmaj01EbADpCuVU/UzyjpScAQINlBYG vi0K6lFMow2CJWDi5vH2FJl1ozZRY3LrHH+zrEIJGEvS0MMkb8URJO4fXfhGsjKdEMt6CuUQ/P8 Ad7oHC3WAShTpUzuGGArUt+3LSiHFIKl5NCuaYYjHoR/1J1aIAOi+UKE53tehuR5hy1TAcFMuY8 peNOS/OEo3Ur+haKUw644yHG+KJw4bphfCZsxusH57jseIBPRLLmjMaF+E7CGDS23VHhfKevuME 2loRecyJV/tPsXZMdiVQZr5qah7QWmI0GVg/6/S3WReBG2/KytQhoLSBWYbOcSLhD1q/Ydcpaak B60i7Pn+vAwVYjtLJrsMhwuvowZp2TgHzj2LA== X-Received: by 2002:a05:6000:288c:b0:43e:ab21:3697 with SMTP id ffacd0b85a97d-43eab2136bemr9178207f8f.29.1776322101724; Wed, 15 Apr 2026 23:48:21 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:21 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 07/47] sqlite3: Fix CVE-2025-70873 Date: Thu, 16 Apr 2026 08:47:08 +0200 Message-ID: <57de3882a93f624caf6d72391f896d6e317da44d.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235349 From: Vijay Anusuri Pick patch as per [1] [1] https://sqlite.org/src/info/3d459f1fb1bd1b5e [2] https://sqlite.org/forum/forumpost/761eac3c82 [3] https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../sqlite/files/CVE-2025-70873.patch | 33 +++++++++++++++++++ meta/recipes-support/sqlite/sqlite3_3.48.0.bb | 1 + 2 files changed, 34 insertions(+) create mode 100644 meta/recipes-support/sqlite/files/CVE-2025-70873.patch diff --git a/meta/recipes-support/sqlite/files/CVE-2025-70873.patch b/meta/recipes-support/sqlite/files/CVE-2025-70873.patch new file mode 100644 index 00000000000..5c8c429a157 --- /dev/null +++ b/meta/recipes-support/sqlite/files/CVE-2025-70873.patch @@ -0,0 +1,33 @@ +From 5a05c59d4d75c03f23d5fb70feac9f789954bf8a Mon Sep 17 00:00:00 2001 +From: drh <> +Date: Sat, 6 Dec 2025 20:41:24 +0000 +Subject: [PATCH] In the zipfile extension, only return as many bytes as + Inflate actually generated. [forum:/forumpost/761eac3c82|Forum post + 761eac3c82]. Adjust ./configure so that it builds zipfile into testfixture if + ZLIB is available, so that tests get run on unix platforms. + +FossilOrigin-Name: 3d459f1fb1bd1b5e723629c463ab392af7b206ece3388bda216c6a4c26160909 + +Upstream-Status: Backport [https://github.com/sqlite/sqlite/commit/5a05c59d4d75c03f23d5fb70feac9f789954bf8a] +CVE: CVE-2025-70873 +Signed-off-by: Vijay Anusuri +--- + shell.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/shell.c b/shell.c +index ca26f8a..a3f7898 100644 +--- a/shell.c ++++ b/shell.c +@@ -11141,7 +11141,7 @@ static void zipfileInflate( + if( err!=Z_STREAM_END ){ + zipfileCtxErrorMsg(pCtx, "inflate() failed (%d)", err); + }else{ +- sqlite3_result_blob(pCtx, aRes, nOut, zipfileFree); ++ sqlite3_result_blob(pCtx, aRes, (int)str.total_out, zipfileFree); + aRes = 0; + } + } +-- +2.43.0 + diff --git a/meta/recipes-support/sqlite/sqlite3_3.48.0.bb b/meta/recipes-support/sqlite/sqlite3_3.48.0.bb index c9ff062255f..df261bdbf86 100644 --- a/meta/recipes-support/sqlite/sqlite3_3.48.0.bb +++ b/meta/recipes-support/sqlite/sqlite3_3.48.0.bb @@ -6,6 +6,7 @@ LIC_FILES_CHKSUM = "file://sqlite3.h;endline=11;md5=786d3dc581eff03f4fd9e4a77ed0 SRC_URI = "http://www.sqlite.org/2025/sqlite-autoconf-${SQLITE_PV}.tar.gz \ file://CVE-2025-3277.patch \ file://CVE-2025-6965.patch \ + file://CVE-2025-70873.patch \ " SRC_URI[sha256sum] = "ac992f7fca3989de7ed1fe99c16363f848794c8c32a158dafd4eb927a2e02fd5" From patchwork Thu Apr 16 06:47:09 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86221 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 36EDAF88078 for ; Thu, 16 Apr 2026 06:48:32 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7573.1776322104190877382 for ; Wed, 15 Apr 2026 23:48:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=1CwWKCV0; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43d7650202fso3335642f8f.2 for ; Wed, 15 Apr 2026 23:48:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322102; x=1776926902; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=G4DGxj33M83tdzDTFm/C37grkZ67fTY0gJo5pUhvEHw=; b=1CwWKCV0zl9OT5bbweJRGMURB04hL76yuWJcKIPBg/ewLAoY1OG6jctD/M5i+ueOum Q9LnbNsXIZ7UvTWEiJjSN7z3HydTQFQ4REkJP72UHNSZLaKzDrHXVYcPXU1iDWK/FZ+c EzntnZkq8pbjgde9L0VenZxBOmbH9UkZ+mtts= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322102; x=1776926902; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=G4DGxj33M83tdzDTFm/C37grkZ67fTY0gJo5pUhvEHw=; b=LN/hmnK+LevIM4zl2+25C+U50q8erwuy2vKoYvU6PS0k5q7WCoDH+bb+Ni7MCtVAUB djgryV9vkRRWBbR5q68YIC7YLuXRycARR/yHa6E+McTa72JrRJ421lbVocWokYukWkAS CImDibgWyDoECLjw0LeP9yHli5LfqUuC0TMS8+bt+N+Rvb7jVi/v6/c83ThKV7OKNl+x ynWvhXnCRN4JYBGY3hoZ1nh6Rvf6i5Tw4BFPmexhfeNn6qSGfBqFYTHB/NvPvBw3M5xk 3UdS7Cp8Ba/IjiJtbsQllWHHmmk3lInD5eG9iLh1pPnuPmkmbyEApSloJCYiCyTEzSZm 0LKg== X-Gm-Message-State: AOJu0YzdBBoa0KY8RZJg1lENKC/Hf2SpdfZbbiYePF7NTXraqfn+dXfB X9Hv9JAgftYFXkasr0HSsuTC1TPbpXOr+FxsvUN2CX8DOxdCCpEeIRBAgiehuLv8ozRxeeTorPh 3zgW9V2XYhDUe X-Gm-Gg: AeBDiesy4PotfnpALIihgd+us4bLLlYCrLTHoOryMkH3suLSAdfuNNsPPqFuiDCKq8/ rv5RF9El1Cz9pfs7VOK4xFpeLOd4YP/Xq/ZLDQINhRUsHOBe1uCpvEKig0G3ERC/BRIilzshDjW 2TinARwfVZaXT6qFG1MmruO3zfgFfIp8fRQx40RDxuAxZsNwG/WPrGUleYm1QmRGIfip4HQtPFz ckOH1dk65EbuzGfURaI8U6gBLIYf8ZWk8/+B3wjvCZ2QEJ4j0vkXWBNcmwF5/dZMlescSMB0oC2 kTOb8tGdo0djRpi3GtI6QK75Mfjpzsa3KN2CJgk73BnQXJiOnOFjJ/scB1GJLl2ntSDCsK/GMSl cMaaMMBwQdiT8X+2yxA8+4H3P0hyb1v90aEm4acryndGUUuo7wwTW+KfWq9VU87CP0HyUuOcwfC YtwK/F+hkVPmOJU73/8c/ZVnG8Fi8lYEMHfaCKd2HYdMoV9PpiBrFdpjMYqEXCZoRgiQ24KJs6e qMZoBkwDFJ3oKtSGixRHd9VEEUzVllFIaTf0OxZmA1DATbM X-Received: by 2002:a05:6000:24c2:b0:43d:dd:8ca4 with SMTP id ffacd0b85a97d-43d6429b7b6mr35293749f8f.14.1776322102266; Wed, 15 Apr 2026 23:48:22 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:21 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 08/47] python3: upgrade 3.13.11 -> 3.13.12 Date: Thu, 16 Apr 2026 08:47:09 +0200 Message-ID: <976d4764a2d676c2d477563123a9b96fa19a95be.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235350 From: Vijay Anusuri Handles CVE-2025-15282 Release information: * https://www.python.org/downloads/release/python-31312/ * Python 3.13.12 is the twelfth maintenance release of 3.13, containing around 240 bugfixes, build improvements and documentation changes since 3.13.11. Signed-off-by: Vijay Anusuri [YC: Full changelog: https://docs.python.org/release/3.13.12/whatsnew/changelog.html ] Signed-off-by: Yoann Congal --- .../python/{python3_3.13.11.bb => python3_3.13.12.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/python/{python3_3.13.11.bb => python3_3.13.12.bb} (99%) diff --git a/meta/recipes-devtools/python/python3_3.13.11.bb b/meta/recipes-devtools/python/python3_3.13.12.bb similarity index 99% rename from meta/recipes-devtools/python/python3_3.13.11.bb rename to meta/recipes-devtools/python/python3_3.13.12.bb index 2bc2389b7e4..e30acebe20d 100644 --- a/meta/recipes-devtools/python/python3_3.13.11.bb +++ b/meta/recipes-devtools/python/python3_3.13.12.bb @@ -36,7 +36,7 @@ SRC_URI:append:class-native = " \ file://0001-Lib-sysconfig.py-use-prefix-value-from-build-configu.patch \ " -SRC_URI[sha256sum] = "16ede7bb7cdbfa895d11b0642fa0e523f291e6487194d53cf6d3b338c3a17ea2" +SRC_URI[sha256sum] = "2a84cd31dd8d8ea8aaff75de66fc1b4b0127dd5799aa50a64ae9a313885b4593" # exclude pre-releases for both python 2.x and 3.x UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P\d+(\.\d+)+).tar" From patchwork Thu Apr 16 06:47:10 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86218 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00482F88073 for ; Thu, 16 Apr 2026 06:48:32 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7716.1776322105221795252 for ; Wed, 15 Apr 2026 23:48:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=CPvURoRA; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43d7213b6ebso2681923f8f.3 for ; Wed, 15 Apr 2026 23:48:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322103; x=1776926903; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=zwTVIoATG0nuEQawV94F0xmwLgenCLpp9msphq4MknQ=; b=CPvURoRAb26oPvtoR5FSCs/n8Ngo8chk/eFDXmgiWIOC6EjAIjVDYVPRai2L1sJCt0 LcbGaoyhOGA+rCJronCBfAOOdR4Kcgl5NpM2Pu37j9vxrSSHPhOfeX1jZZQgkiLdhwHp IHdjXwnBhEd+cJX524YbWAXDfdWj0hPGPC6Dc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322103; x=1776926903; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=zwTVIoATG0nuEQawV94F0xmwLgenCLpp9msphq4MknQ=; b=J1aNHcXKmEyad5HGGuNvJteKbZiBgEqDqEQDX4jNCewhP94KfVCO7HwGsTxJjS7qS6 P5128fbFCKELROqBM4wG77w3YlLAn7BQDXNjv8s+x6M4+OnFrKlOVw1VcSsRx6zfuEpv /fycwPJgkORzakstwsRfsNuev+gKJKtjNvmfcYJXGQZsXb6Kg4Re7WZZNIXLjiiazwrQ khdQtg8P3pvofEtXIklx6QWKqC3d9xpEUGUDZ9bw/L/QxXr6XL8FsAxUpvuFjiXROODJ PX7UUqkn9oDTM1QVZj++EkGPHxgSm+cgPn/zEvmxAvbPieHdtaVr6sFdcsLLd+Blt2q3 couw== X-Gm-Message-State: AOJu0YyR3niWlDtTrM3ANvdp7NW+O2F4oCbiHpsA7l335wAiNNPHEeL7 J0aMBaE0Z8ACOm6GRTUsSB0zx5uhzOD42kk/kh9ByNdfXjl6GUPqWVwMRNwskyaas0CiXL7HK4U AdpEoVELNkiFR X-Gm-Gg: AeBDies22MSp/K9TmERqJ5cOChP7ObKJTNGWOWtRRiPK1BmK2wFpaZeya999yiCN8dz q1XMLKH8e5UkFtgxBwMUfdJiOJQ9PAISyUPh9ZUeblU+gTkUrOshzvEJTNENny9Osyl1ZfMFm/j bZYjcNkeuIBgawMu8lAKL7SaQYkPMzAF68vSMZvilB2DKmYHv4j7IdCL3BGQzp1C/czzQNeTx6u hIv6wmNwiTNxZpzwrQXJ3fP0Nn/BySqwfxCUuV/Qt0lu6S52yhOyfA/n6AKPFaJBnIqXhb7OAak V8cT72sCK7oSnIrImpxkf0G6/wS8sPbWp3xt4KZa4KS2q9a3GPCm38wu7WmXKnEwTKsEU7CbS6j ZV8Aef2zNq24omOhH9Wo6d6dZLvbmL+1OwYWU6ANfgctBic9MkkQlxOMCmaYEP8EaNlQS1JEszj ghan3CNuUtuS/o2dHlMwFefsSQzBrV8tMHxfWuFl4NBTrbC2eQ/wsjRorppLCC7ddJHmE5q8IIE 7RN+0S1hqmVdFWwwVXmQpCA7LkR+kEqDHC5Lg== X-Received: by 2002:a05:6000:2301:b0:43d:e31:68d1 with SMTP id ffacd0b85a97d-43d6428e2damr36970576f8f.21.1776322103246; Wed, 15 Apr 2026 23:48:23 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:22 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 09/47] libarchive: upgrade 3.8.5 -> 3.8.6 Date: Thu, 16 Apr 2026 08:47:10 +0200 Message-ID: <4f873ad9abb1c10d0dc41f219f4a8ae5b8b1d53c.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235351 From: Peter Marko Release information [1]: Libarchive 3.8.6 is a security and bugfix release. Notable fixes: * libarchive: fix incompatibility with Nettle 4.x (#2858) * libarchive: fix NULL pointer dereference in archive_acl_from_text_w() (#2859) * bsdunzip: fix ISO week year and Gregorian year confusion (#2860) * 7zip: ix SEGV in check_7zip_header_in_sfx via ELF offset validation (#2864) * 7zip: fix out-of-bounds access on ELF 64-bit header (#2875) * RAR5 reader: fix infinite loop in rar5 decompression (#2877) * RAR5 reader: fix potential memory leak (#2892) * RAR5: fix SIGSEGV when archive_read_support_format_rar5 is called twice (#2893) * CAB reader: fix memory leak on repeated calls to archive_read_support_format_cab (#2895) * mtree reader: Fix file descriptor leak in mtree parser cleanup (CWE-775, #2878) * various small bugfixes in code and documentation [1] https://github.com/libarchive/libarchive/releases/tag/v3.8.6 Signed-off-by: Peter Marko Signed-off-by: Robert Yang Signed-off-by: Richard Purdie (cherry picked from commit 9e5d18040b0999dbfaea09b8a8a9f8a4bcac6349) Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../libarchive/{libarchive_3.8.5.bb => libarchive_3.8.6.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-extended/libarchive/{libarchive_3.8.5.bb => libarchive_3.8.6.bb} (96%) diff --git a/meta/recipes-extended/libarchive/libarchive_3.8.5.bb b/meta/recipes-extended/libarchive/libarchive_3.8.6.bb similarity index 96% rename from meta/recipes-extended/libarchive/libarchive_3.8.5.bb rename to meta/recipes-extended/libarchive/libarchive_3.8.6.bb index fcfaf5d2313..c984eb78401 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.8.5.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.8.6.bb @@ -32,7 +32,7 @@ EXTRA_OECONF += "--enable-largefile --without-iconv" SRC_URI = "https://libarchive.org/downloads/libarchive-${PV}.tar.gz" UPSTREAM_CHECK_URI = "https://www.libarchive.org/" -SRC_URI[sha256sum] = "8a60f3a7bfd59c54ce82ae805a93dba65defd04148c3333b7eaa2102f03b7ffd" +SRC_URI[sha256sum] = "213269b05aac957c98f6e944774bb438d0bd168a2ec60b9e4f8d92035925821c" inherit autotools update-alternatives pkgconfig From patchwork Thu Apr 16 06:47:11 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86217 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E7F69F8806F for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7717.1776322105833726665 for ; Wed, 15 Apr 2026 23:48:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=pmpUpjnr; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43cfd1f9fd1so4850880f8f.3 for ; Wed, 15 Apr 2026 23:48:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322104; x=1776926904; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=5H+956W2Om0GF7vXp5yZdzTN9B0+uVvwobbLTIuw/HA=; b=pmpUpjnrzbE9BLG0/CjUAbecGY6RurCZJfqIn2RIgTT2PI+O6ToJxxjWXFmp5gtNqa QDbJL43WiVQGxJXIz763x3vAuuoN8KanH/li4CDasLBt8L4l3qPd/9S2VNROdAr0KJQn 1MWLeMjvqo68muJo+M+hTftz7v9oK+KoslS6A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322104; x=1776926904; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=5H+956W2Om0GF7vXp5yZdzTN9B0+uVvwobbLTIuw/HA=; b=G9WB5ZV8P70InFpjPKJad1psBVH0nf8+Y9sG+GII5/nuC4Z1u9uzFyrnVmuRM5RmKU 9jVLa2QgMRtKCHZ6+aHShSaA+lVcyp3autxq+IPzOQqnpwVLVBQNP94LTpfeXjuDwr0n pcHNO7kLRFuy9Xb0HMZlNvumRh/3R9sNylLjAvmZkuawi/X7YAUC9sx1x+cS/pETNfAy Vkgc52WTi+UDCS901fkxwoIO6ga2UOw10SM55lY7hD4bIDgHih+WjSMgLwUPtojsOtQ5 XvqlK5ZEWM6wFpt7VIMW20vwkfAQnWAsbQhFhJhPY8r1tpoqiTptouhB5EKRZQtyYF35 ucyg== X-Gm-Message-State: AOJu0YzBi+JFzwiSCdVxAaNfAJ/8oSqww+RmHwQf4q8xewISQp2S6hoz YXG7fl2aPjDUqUqilHH0s6rfu8DhjLygqHMJsI5+9iLhhN26Jy6tfeAfJgXlx9jxWd2NKWYcs41 UixHRz70ErWEH X-Gm-Gg: AeBDiev6/9sgYsnGHCSOZUWXaQE6KljB7hV+cthqqoEKJl4OeW5QWwRaGIKIACMYYC7 4rLPs1NCFy8avN3Uh/y5OeAPoxBJ0Qh4hXoB0xNcv5TpgLYU13PLr1DxegeVn4PwCVDBbhzv6Ly FDuahFHOyxRTuu6u9kNxTWt5FJRqeXcsF414YHVb0Xqd7TkCAK2W26mCxWs5yTtpdygWhllg46n I+zsRM7vGGYGgejIcrT2w6KsUxYyKVzC+0a+gs50pMlD7BhrNX3VJpia4uyf9VogxfmFUWT6+l4 s2TD+vvG9zlg9otvHKQ+Tr4LIldCZs5BJW73zuYx8+jX1+vnRhBabRzqEzeGdXqylEyHJ9zxtsI 09U0tJQ+Vz/Qhz3j22jp9jlVN4J7PSehDQq1tT8hO0mKDvkD27k7h81HHYBeZNtrSzRCnh/4ZHO vui0rQ5TqXQh47K7Pl0F/Tplt00D6SrpdyWAmKcakgYJ0mPnuELJZZLEzFyIxSqbRwppziyCI7U 0N3l3et+WmlsdbVpbY2vP8gENhR7FjxAE7Bzw== X-Received: by 2002:a05:6000:4203:b0:43d:9bb5:bd9a with SMTP id ffacd0b85a97d-43d9bb5bfbfmr16364596f8f.23.1776322103811; Wed, 15 Apr 2026 23:48:23 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:23 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 10/47] vim: Fix CVE-2026-33412 Date: Thu, 16 Apr 2026 08:47:11 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235352 From: Hitendra Prajapati Pick patch from [1] also mentioned in NVD report with [2] [1] https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a [2] https://nvd.nist.gov/vuln/detail/CVE-2026-33412 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-33412.patch | 61 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 62 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-33412.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-33412.patch b/meta/recipes-support/vim/files/CVE-2026-33412.patch new file mode 100644 index 00000000000..62daa308b58 --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-33412.patch @@ -0,0 +1,61 @@ +From 645ed6597d1ea896c712cd7ddbb6edee79577e9a Mon Sep 17 00:00:00 2001 +From: pyllyukko +Date: Thu, 19 Mar 2026 19:58:05 +0000 +Subject: [PATCH] patch 9.2.0202: [security]: command injection via newline in + glob() + +Problem: The glob() function on Unix-like systems does not escape + newline characters when expanding wildcards. A maliciously + crafted string containing '\n' can be used as a command + separator to execute arbitrary shell commands via + mch_expand_wildcards(). This depends on the user's 'shell' + setting. +Solution: Add the newline character ('\n') to the SHELL_SPECIAL + definition to ensure it is properly escaped before being + passed to the shell (pyllyukko). + +closes: #19746 + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c + +Signed-off-by: pyllyukko +Signed-off-by: Christian Brabandt + +CVE: CVE-2026-33412 +Upstream-Status: Backport [https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a] +Signed-off-by: Hitendra Prajapati +--- + src/os_unix.c | 2 +- + src/version.c | 2 ++ + 2 files changed, 3 insertions(+), 1 deletion(-) + +diff --git a/src/os_unix.c b/src/os_unix.c +index cf195e62e1..d767956b1a 100644 +--- a/src/os_unix.c ++++ b/src/os_unix.c +@@ -7106,7 +7106,7 @@ mch_expandpath( + # define SEEK_END 2 + #endif + +-#define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|" ++# define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|\n" + + int + mch_expand_wildcards( +diff --git a/src/version.c b/src/version.c +index 4f3912aedd..712a3e637c 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1684, + /**/ + 1683, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 792a46faf75..c29361cf3c0 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -18,6 +18,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https;tag=v${PV} file://no-path-adjust.patch \ file://CVE-2026-25749.patch \ file://CVE-2026-26269.patch \ + file://CVE-2026-33412.patch \ " PV .= ".1683" From patchwork Thu Apr 16 06:47:12 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86214 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B18AAF88067 for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7575.1776322106289775599 for ; Wed, 15 Apr 2026 23:48:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=rdUwcL2Y; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43cf7683a28so5119418f8f.2 for ; Wed, 15 Apr 2026 23:48:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322104; x=1776926904; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4D9RfUCZVh+iyh8GhBpyOFsLwX5twyAJhgYJtCgl7aA=; b=rdUwcL2YHDPrHjet4hhgolvyMEc1r0vEWb7uuBGgXoX3OLGf5S3TRysUzwQoimy2GX FL1b+Q0hFfQg7BSlFmdDAoC+g1694YpVGAVt/pGmsVh6TeRV+I9yXiAqf1hN/+J8Qqm7 IOdcnm35GJ7lrefxM8z6xaTIRYR7mQPHhoMSk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322104; x=1776926904; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=4D9RfUCZVh+iyh8GhBpyOFsLwX5twyAJhgYJtCgl7aA=; b=Q4GtGSAzW5Nfib4UGQjpC4RGORxUmTPpenGftQJkGushQXbzm770qC2KkCkZuyqDFK o5i2CRcuwddkNRyXM/IoutQ7KgoGZuyMPArhFvSHRP4RpTwHpCrgbqBh+vgycWwRrZ/V yvWQcSyBumxcsASUQxSvpLOldFuZkU5TTBv2uB4BDwoKN5yc/zKYUDfpnktOL0JYqd7E 831vvDNUpQ5DkHG0R2JGWT1x9k9fPEnRN/khkdZ1OsYls0bHEF1Ti/AIssssW1QvVAPO McfYM3kji6pCc1LvXOysrgARkW0/JS1qDgmB0lRWUwjSNfbTeH+5qT1LJATCmHMxNhvC PjIg== X-Gm-Message-State: AOJu0YzAt7vikg+8WL1u9nLgPBh94msSW69i/8iwgMg6OMHSbRBszjrl 23gDALTVM3ZMDr8NNaX1waGDUTXyL77LL5fuPG92uomcIwGUvoZ9G3YvjHhnq1756S6GL/nMlod 1e4N+UazUS5HC X-Gm-Gg: AeBDievbpPCJi4Qee1Ng+elnVu3mETknqJceq+zTlHb42VgpJlxTbL19zA6F6yB/3FC Tto/vE2qY/b8I6bztbRLoimDqd5M8YMl/Cc0Rcace76drpnfeBPhWM6T/RDZX9dQ3HpIKTSputa PEOWfScWDCf8UieDbn8ArfXVxcy6ycbGb2ktiRNJ0IWlNTNCGqG9nMkBfUz778uYSYhkl7x9rIa NZGxVsA0IhebU3RDIm5YFrmEYV20QBUArl2KRK/RRpofK865AHu21uEogeOHsyTWHN2JpK3ipFJ iCGyqrwcgGyjK0EIJwXCePrPqVHVLUUlCr51ySqcehSLq+Ldwuyzo0hk8xJ2/Nz5afXT0qX/LdG KHf2FcTq4J1VrRoni0ZmK6w7PEv8nXJHQ8WYogd/yASkeCDZ/Qjfxc5qWMnTic2cleccJG5796k z3P6beoWAgbb6nswe5hrKeGDQJMod1i3XBZggYxM+ky5G6dce1ZfcyYb+mop8v58dA2jtsh0oNq ci4kWPJnhbiDUfyVxdXKS9uo6T9Fb+bzL8fOQ== X-Received: by 2002:a05:6000:1acb:b0:43d:7a97:78c6 with SMTP id ffacd0b85a97d-43d7a977a20mr22225643f8f.35.1776322104311; Wed, 15 Apr 2026 23:48:24 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:24 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 11/47] vim: Fix CVE-2026-28418 Date: Thu, 16 Apr 2026 08:47:12 +0200 Message-ID: <2c12cdc3442f31038ad64404c6bab4dd64c9a92f.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235353 From: Hitendra Prajapati Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d [2] https://nvd.nist.gov/vuln/detail/CVE-2026-28418 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-28418.patch | 78 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 79 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-28418.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-28418.patch b/meta/recipes-support/vim/files/CVE-2026-28418.patch new file mode 100644 index 00000000000..3a80ba77f7d --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-28418.patch @@ -0,0 +1,78 @@ +From f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Mon, 23 Feb 2026 18:30:11 +0000 +Subject: [PATCH] patch 9.2.0074: [security]: Crash with overlong emacs tag + file + +Problem: Crash with overlong emacs tag file, because of an OOB buffer + read (ehdgks0627, un3xploitable) +Solution: Check for end of buffer and return early. + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j + +Signed-off-by: Christian Brabandt + +CVE: CVE-2026-28418 +Upstream-Status: Backport [https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d] +Signed-off-by: Hitendra Prajapati +--- + src/tag.c | 3 +++ + src/testdir/test_taglist.vim | 15 +++++++++++++++ + src/version.c | 2 ++ + 3 files changed, 20 insertions(+) + +diff --git a/src/tag.c b/src/tag.c +index a32bbb2459..45af67f20d 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -1902,6 +1902,9 @@ emacs_tags_new_filename(findtags_state_T *st) + + for (p = st->ebuf; *p && *p != ','; p++) + ; ++ // invalid ++ if (*p == NUL) ++ return; + *p = NUL; + + // check for an included tags file. +diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim +index 5a946042be..506e64f7ae 100644 +--- a/src/testdir/test_taglist.vim ++++ b/src/testdir/test_taglist.vim +@@ -301,4 +301,19 @@ func Test_tag_complete_with_overlong_line() + set tags& + endfunc + ++" This used to crash Vim ++func Test_evil_emacs_tagfile() ++ CheckFeature emacs_tags ++ let longline = repeat('a', 515) ++ call writefile([ ++ \ "\x0c", ++ \ longline ++ \ ], 'Xtags', 'D') ++ set tags=Xtags ++ ++ call assert_fails(':tag a', 'E426:') ++ ++ set tags& ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +diff --git a/src/version.c b/src/version.c +index 712a3e637c..7d265ab641 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1685, + /**/ + 1684, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index c29361cf3c0..11200a08240 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -19,6 +19,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https;tag=v${PV} file://CVE-2026-25749.patch \ file://CVE-2026-26269.patch \ file://CVE-2026-33412.patch \ + file://CVE-2026-28418.patch \ " PV .= ".1683" From patchwork Thu Apr 16 06:47:13 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86215 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D2138F8806D for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7576.1776322107348380989 for ; Wed, 15 Apr 2026 23:48:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ZBbxkr6+; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43d75312379so180405f8f.1 for ; Wed, 15 Apr 2026 23:48:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322105; x=1776926905; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mXN7aEZFKmUORiNVJiXvWTSjjE98DeEPnv8xkjv6vSc=; b=ZBbxkr6+720Y19jvSKmVPZHBqXKEkKjGvJb3C0JHS79/RIg/pltvdXZnsvc74qxvYX WhPgaSJmlCQ13fRmuJ1YZE+5EKru3k0zIqOorYPt50kKwUuMg57MLh5YSAp6W8/PmE9i WguxspI8A4hKgav589sCadg67kuzEMVBl7gFg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322105; x=1776926905; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=mXN7aEZFKmUORiNVJiXvWTSjjE98DeEPnv8xkjv6vSc=; b=El95Ljazgoj2+bcY/BZGrEp9Vh8UbExZXhc2GgKGg1fZYmF3bkNrEMHY+L7yus/AkR DQYbaHGX8OHhLlYFAqYUcUAGQgn1CHZYGuFNfpMcx5sEyaO3yGh0OeaEWlc2zUCQnyBi WQZ04/y7eU+TY47MfBG1Eus/oXWw6IU8s3mSumMJ8PA2yEATcSv+oClEg6gNgpYpQduR edpLlPy5q7nJgPGj2epRiZmusy1tb36i+CSbHkiq2mG1mT291qi4cjhpOAQ71/MKIH88 L0SsWRjzK+cUn1AaEEK/9Ukxz3GKYcfnUyCmX0/pn/S+IDl2QzewmQrmYKZvKjjZ/R+V XrfQ== X-Gm-Message-State: AOJu0YxqFogaGLYKHhjeSU2VS3xjHFyHMxHcTnkgOR19OOnTGQAT7L+p nYD37YiRCHgaYzut7V5flpFqkDr13icV7p9z8RVvW4D6VDQafwxNVPGpouHDxmNe2NDueDv/Bln zHjqBfZIk1+hk X-Gm-Gg: AeBDietIkyiTn/Pt5SxZFiMTVSZDN8pVuiIBe+3t0yFRJzC/07wqhdm6uS0SZUd9hM6 wVMpIVy3kDmEBq3OdcsDgfodGfQnzfRqx73MSRBLC1UT7zT9o2SA55UZvys7Gh1OshrMQtemLhg SVbaMzQ5AKkWNWVt7DFx1gqDWvVuEjwgrfe24nb8S+QYcqYfgoS+4pdmBu83gD2u0kv+DI3L+JY lUm9P9zrV91D8Ti49TxE8HNG3ASR8ZwMfsauRXaXglg0kzPNya8V5sbB4Kownb14gAcZB+MQHoe Rljo3V1zIt+8sxCHz6ckF2rYdlYHQjiJi6XoRIwFCLUZTHIdzfc89mGx0EGcnapwbk2mE61IhDS 0aNwAG3IjIdvilG407KtggW0beOC1JrkMUZQRCEynbAwFRyfXu0vgU6vkN65Vr9fsPZeM2ReK+b 7emBQPtMyNrt3h0H1/L/e74NNpnXsafLPs7/a8tO/pSem452e6+J1oEYtM2/c8c+OXXse2TLBTj QW7pbMWl+jHVpI/yLXVXl/kpOXuyvRKbr3I9w== X-Received: by 2002:a05:6000:1865:b0:43e:531f:720c with SMTP id ffacd0b85a97d-43fdbb400a3mr928858f8f.11.1776322105389; Wed, 15 Apr 2026 23:48:25 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:24 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 12/47] vim: Fix CVE-2026-28419 Date: Thu, 16 Apr 2026 08:47:13 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235354 From: Hitendra Prajapati Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 [2] https://nvd.nist.gov/vuln/detail/CVE-2026-28419 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-28419.patch | 86 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 87 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-28419.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-28419.patch b/meta/recipes-support/vim/files/CVE-2026-28419.patch new file mode 100644 index 00000000000..91100a7e91e --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-28419.patch @@ -0,0 +1,86 @@ +From 9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Mon, 23 Feb 2026 19:35:25 +0000 +Subject: [PATCH] patch 9.2.0075: [security]: Buffer underflow with emacs tag + file + +Problem: When parsing a malformed Emacs-style tags file, a 1-byte + heap-buffer-underflow read occurs if the 0x7f delimiter + appears at the very beginning of a line. This happens + because the code attempts to scan backward for a tag + name from the delimiter without checking if space exists. + (ehdgks0627, un3xploitable) +Solution: Add a check to ensure the delimiter (p_7f) is not at the + start of the buffer (lbuf) before attempting to isolate + the tag name. + +GitHub Advisory: +https://github.com/vim/vim/security/advisories/GHSA-xcc8-r6c5-hvwv + +Signed-off-by: Christian Brabandt + + +CVE: CVE-2026-28419 +Upstream-Status: Backport [https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0] +Signed-off-by: Hitendra Prajapati +--- + src/tag.c | 3 +++ + src/testdir/test_taglist.vim | 16 ++++++++++++++++ + src/version.c | 2 ++ + 3 files changed, 21 insertions(+) + +diff --git a/src/tag.c b/src/tag.c +index 45af67f20d..d3a73997bb 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -2023,6 +2023,9 @@ etag_fail: + } + else // second format: isolate tagname + { ++ if (p_7f == lbuf) ++ goto etag_fail; ++ + // find end of tagname + for (p = p_7f - 1; !vim_iswordc(*p); --p) + if (p == lbuf) +diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim +index 506e64f7ae..42ecc4b76e 100644 +--- a/src/testdir/test_taglist.vim ++++ b/src/testdir/test_taglist.vim +@@ -316,4 +316,20 @@ func Test_evil_emacs_tagfile() + set tags& + endfunc + ++" This used to crash Vim due to a heap-buffer-underflow ++func Test_emacs_tagfile_underflow() ++ CheckFeature emacs_tags ++ " The sequence from the crash artifact: ++ let lines = [ ++ \ "\x0c\xff\xffT\x19\x8a", ++ \ "\x19\x19\x0dtags\x19\x19\x19\x00\xff\xff\xff", ++ \ "\x7f3\x0c" ++ \ ] ++ call writefile(lines, 'Xtags', 'D') ++ set tags=Xtags ++ call assert_fails(':tag a', 'E431:') ++ ++ set tags& ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +diff --git a/src/version.c b/src/version.c +index 7d265ab641..4f47ec2688 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1686, + /**/ + 1685, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 11200a08240..70d3dbf7d8c 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -20,6 +20,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https;tag=v${PV} file://CVE-2026-26269.patch \ file://CVE-2026-33412.patch \ file://CVE-2026-28418.patch \ + file://CVE-2026-28419.patch \ " PV .= ".1683" From patchwork Thu Apr 16 06:47:14 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86213 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BDDDBF88069 for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7578.1776322108367750023 for ; Wed, 15 Apr 2026 23:48:28 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=PB3SKq0l; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43cf7683a28so5119435f8f.2 for ; Wed, 15 Apr 2026 23:48:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322106; x=1776926906; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LVxFLZXyxleC1/tWo9DUC3Wm/ch6/RCWSpYsaOU0/Q4=; b=PB3SKq0ly96Oj/TT7UIFMShjhWfpjbEUooaKVdMuOoHTPwg8iy/QqqsGIBPrzbBLw5 nAFKabhl1zfuW/iGEijF1PK1rLcu5V/kl/YtmZANWwYaMbWW5QJ49MWBQH9GsZy9agWB FKHoD37XxUJNhw32fjwJnqtAF0BryI6naTOxU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322106; x=1776926906; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=LVxFLZXyxleC1/tWo9DUC3Wm/ch6/RCWSpYsaOU0/Q4=; b=SlG3o2+Owiz8OUcPBTSt0G2jjs+cU+iV9fd4rSdIM9e2F5AiDdlO+b648zdNTKIffb 1gdoSdnmexHh6WMmT1hsz6np9lDff/SOGATNc5HtLK7+myTvrBbRVnLniF6eEdlvgghV enzf17ACvwgSvJ47UgKHruqYG/M5mxT1dnSN0KrB0SqeN3t369GlyOiHXxuj7dgvPNY7 tAOBaCpd0GtW41cHNpwTY4M0iytGQiZcH3Zs/QYYQPDhevMXGrkgWBfJvSEEk+OQOmwy F+1M8oI/0KGOB4WRrIRqWnv14fWvIDe0Howa7BaPkPpaXtV1KVOgzOjvL4gH4udpBXiR jYUA== X-Gm-Message-State: AOJu0YzVj+FhduU/UfjJe9hZ/Do65VoOTqUrb8loyUqTaW9LKGD7qJ7g GPXz1QMl7b16hiWSEksZRl+73X5uIZYQlj7F8s/xVPF4Ks5GwRJJsyDOb2S7VLdnvfPAmtI48EV YY9FzrnPOPJfs X-Gm-Gg: AeBDieuG/UrDI/UG5zVM5tKWv26cq9ExPLWXq32/3b71Fko00/y0MUEdxHB4csDHrdB 8ZC9xbnMwss7iWsEIy5+tnf6OLHBmC0V7AifiuW8jEfLoDSh4PnmH14SMHvT+KgJX6yJ/K6SZhu fC9xeI9DVF8YyX70Jz3fg6usGmXuQeNUphg/sAGkPb9TTzWov76dg/nkH6TufwJyPm8ncEIPdHM AW9hhI4Xfh+tN/saFoL+G6DXZyw76oGqvOFaBo/RFSqaVlrkKvwaXjWmKGNPWrvmzH+1Fojn77P eOHl6Cygu42jxfxDHAdlCq86rzoeSNIUryQ7M3y5OcJWD611qRLFHvZa2vQ1X3XeyEpTP/3QN2V DUnw/GF0StEHDvMpFdy1WVtMh9YIO5bQS6cURp4VZuxBlPLqR+kzVZegW90ri5lNUpmQoDwXu6v a6/BerV+3Z4HdTK/PCU6512EgO0iHyTlwNUGqRApkA2GwCr3rdzV+26jQUkVN7e6iy27K4VmAEz w9VMjax6stYJLKrtL0/ZZE7vTEyQEiv2tkqOwhVpDmEpv0i X-Received: by 2002:a05:6000:1847:b0:43b:4f0c:aefd with SMTP id ffacd0b85a97d-43d642b9e05mr35249205f8f.23.1776322106383; Wed, 15 Apr 2026 23:48:26 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:25 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 13/47] binutils: Fix build with GLIBC 2.43 on the host Date: Thu, 16 Apr 2026 08:47:14 +0200 Message-ID: <47c73e8d5c4b60e7a9124010352804507b76d75d.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235355 From: Zoltán Böszörményi Added a patch to fix a build error in the CALL_UTIL() macro when built against GLIBC 2.43 on Fedora 44. This fixes binutils-native. Signed-off-by: Zoltán Böszörményi Signed-off-by: Yoann Congal --- .../binutils/binutils-2.45.inc | 1 + ...tect-against-standard-library-macros.patch | 34 +++++++++++++++++++ 2 files changed, 35 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.45.inc b/meta/recipes-devtools/binutils/binutils-2.45.inc index f635d76069a..81d46bfb734 100644 --- a/meta/recipes-devtools/binutils/binutils-2.45.inc +++ b/meta/recipes-devtools/binutils/binutils-2.45.inc @@ -52,4 +52,5 @@ SRC_URI = "\ file://CVE-2025-69644_CVE-2025-69647.patch \ file://CVE-2025-69649.patch \ file://CVE-2025-69652.patch \ + file://0001-gprofng-protect-against-standard-library-macros.patch \ " diff --git a/meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch b/meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch new file mode 100644 index 00000000000..b626c51b6cd --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0001-gprofng-protect-against-standard-library-macros.patch @@ -0,0 +1,34 @@ +From 5f66aee7f4bec7a2d8378034116f5e5c3dc50f41 Mon Sep 17 00:00:00 2001 +From: Andreas Schwab +Date: Sat, 22 Nov 2025 11:29:43 +0100 +Subject: [PATCH] gprofng: protect against standard library macros + +The CALL_UTIL macro can expand to an unparsable expression of the argument +is a macro, like with the new const-preserving standard library macros in +C23. + + * gprofng/src/collector_module.h (CALL_UTIL): Add parens to not + expand its argument if it is a function-like macro. + +Signed-off-by: Andreas Schwab +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=5f66aee7f4bec7a2d8378034116f5e5c3dc50f41] +--- + gprofng/src/collector_module.h | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/gprofng/src/collector_module.h b/gprofng/src/collector_module.h +index b64d69c45ab..859a6dd1f7d 100644 +--- a/gprofng/src/collector_module.h ++++ b/gprofng/src/collector_module.h +@@ -119,7 +119,7 @@ typedef struct CollectorUtilFuncs + extern CollectorUtilFuncs __collector_util_funcs; + extern int __collector_dlsym_guard; + +-#define CALL_UTIL(x) __collector_util_funcs.x ++#define CALL_UTIL(x) (__collector_util_funcs.x) + + /* The following constants define the meaning of the "void *arg" + * argument of getFrameInfo(). +-- +2.53.0 + From patchwork Thu Apr 16 06:47:15 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86211 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A7ADCF88065 for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f68.google.com (mail-wr1-f68.google.com [209.85.221.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7718.1776322109000737092 for ; Wed, 15 Apr 2026 23:48:29 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=RuDDfSsx; spf=pass (domain: smile.fr, ip: 209.85.221.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f68.google.com with SMTP id ffacd0b85a97d-43d7e23defbso2002341f8f.0 for ; Wed, 15 Apr 2026 23:48:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322107; x=1776926907; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ETGuimHbfVbFgfDSPVFns+rP2MD8XnFFc9aSAz2BHI8=; b=RuDDfSsxxZBfoxo/Scy9fJiwcW6b+4cp74csevw2a1BYTEUdffAATog+bC1IXUlyeT JBpdNhdG4quy1JDq21Zyow3vmGwcUt31rmJMGh5oIZEA2CMkwahKjYzrNUyvZiYUPVHy 1LU0IekzFIT8e5CKDKxp7s/HrndoVQ8Ph6P4U= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322107; x=1776926907; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ETGuimHbfVbFgfDSPVFns+rP2MD8XnFFc9aSAz2BHI8=; b=Kr4aBW6ca95Na+bPGv1/otaSp8Us/FJ+WvxpORl8K2eBsbfGSYfHl0/T+AlVVdkU7x /pWbCMg0nOYSBOvfktt/v2OruIE94O+u5tT0PIcB9CWsRAqDThwAGSLotVFMOcuZbz1z ZC9yefIN0jClEb6VNhG81kVXtG82bZj6gX3wwy84mT+LF0nWNghacAXIqN2NrQPtMHzW s+ptZPo6hnuRrqjuZ4tQu6Wh4Okq1EU9PHQee2oFyjITJk0ayPXDB55kHcroO2ecxoEf LPYZS4BjPcC6WMyNorLjB88huB2RYziWndXg51FtvT0rUwpo9ivjEAO/zVultPYl1U55 WTuw== X-Gm-Message-State: AOJu0YxRg/1ZLkQxoMjBptiAzXW+CjvyiKSrfIhpJYnLnhU+jjI1UijW KRYzf4fbD5NFaYMqpSloE7h+isVcGab1rZfbEndNKBSWFFEPWaAkvDBjL2aPa/W7PWAYkm3I3Tz ipkKrIhFcJlx7 X-Gm-Gg: AeBDiesBJNmjtbY4b/B/5jFDriVVVEzmgy6eYS/nX0dVxU/RPOMmARfyseriuTg/GDE 3SuJ8woax3MShYrjKt8kKS4sKqZ1/tgAz+n+0AxMMQCPWeTigAGgZRjWie8AWARaufPGAxX0XRr 0TEqsR6UIr5/8Srnr1UuxzrQmHtYvpL/K2MfjqIxQAtQ7tjx3Zi1Kb3/Icpd4FTdKWXG+wS4LY3 KbceCgYxLr8AkoQGM5FaNWrpC66DIKsRBRZbdmE5VRrBnad4b5t11IuM2xJtotp9wvzwjANl+5Y clr5yOiWWJ5ieGHj8yMrCi/oOI19xan4fohgCanxVV6s64IEiJvRtyX4ymgUWoOd6maEvakJs5D cVa61c+wP0wQZNQwU9Tgmri/jmcm8FjSiJuQwtgbSdlz+gL/jp+kjlXtDomURq+YOGtrKdh86gI 2TQQsHzu2fBQmnBUAedReuahJmukeyWn6+rS8RcP2G5PplZVg7Ftq3QFPYUImqCpat6xUMq911F 8fpLyE8OmdON0oz4LEx/oRwX66mSWIm4QTdVfE+sheHF+zC X-Received: by 2002:a05:6000:2c06:b0:43c:f1da:4880 with SMTP id ffacd0b85a97d-43d64286b9cmr37628659f8f.22.1776322106942; Wed, 15 Apr 2026 23:48:26 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:26 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 14/47] gcc: backport a fix for building with gcc-16 Date: Thu, 16 Apr 2026 08:47:15 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235356 From: Martin Jansa Fixes: https://errors.yoctoproject.org/Errors/Details/905192/ when building on host with gcc-16 Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 9eabea38f0c17d41d97284d63a25e45da3c9bbcc) Signed-off-by: Yoann Congal --- meta/recipes-devtools/gcc/gcc-15.2.inc | 1 + ...dy-Make-it-buildable-by-C-11-to-C-26.patch | 257 ++++++++++++++++++ 2 files changed, 258 insertions(+) create mode 100644 meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch diff --git a/meta/recipes-devtools/gcc/gcc-15.2.inc b/meta/recipes-devtools/gcc/gcc-15.2.inc index d178b254878..69eff3621d0 100644 --- a/meta/recipes-devtools/gcc/gcc-15.2.inc +++ b/meta/recipes-devtools/gcc/gcc-15.2.inc @@ -73,6 +73,7 @@ SRC_URI = "${BASEURI} \ file://0024-Avoid-hardcoded-build-paths-into-ppc-libgcc.patch \ file://0025-gcc-testsuite-tweaks-for-mips-OE.patch \ file://0026-fix-pr90579-testcases.patch \ + file://0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch \ " UNPACKDIR = "${TMPDIR}/work-shared/gcc-${PV}-${PR}/sources" diff --git a/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch new file mode 100644 index 00000000000..431facb0110 --- /dev/null +++ b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch @@ -0,0 +1,257 @@ +From 0ffe3c9af4e5d5468df742512b6e930fe7039230 Mon Sep 17 00:00:00 2001 +From: Jakub Jelinek +Date: Fri, 21 Nov 2025 16:25:58 +0100 +Subject: [PATCH] libcody: Make it buildable by C++11 to C++26 + +The following builds with -std=c++11 and c++14 and c++17 and c++20 and c++23 +and c++26. + +I see the u8 string literals are mixed e.g. with strerror, so in +-fexec-charset=IBM1047 there will still be garbage, so am not 100% sure if +the u8 literals everywhere are worth it either. + +2025-11-21 Jakub Jelinek + + * cody.hh (S2C): For __cpp_char8_t >= 201811 use char8_t instead of + char in argument type. + (MessageBuffer::Space): Revert 2025-11-15 change. + (MessageBuffer::Append): For __cpp_char8_t >= 201811 add overload + with char8_t const * type of first argument. + (Packet::Packet): Similarly for first argument. + * client.cc (CommunicationError, Client::ProcessResponse, + Client::Connect, ConnectResponse, PathnameResponse, OKResponse, + IncludeTranslateResponse): Cast u8 string literals to (const char *) + where needed. + * server.cc (Server::ProcessRequests, ConnectRequest): Likewise. + +Signed-off-by: Martin Jansa +Upstream-Status: Backport [07a767c7a50d1daae8ef7d4aba73fe53ad40c0b7] +--- + libcody/client.cc | 36 +++++++++++++++++++----------------- + libcody/cody.hh | 22 ++++++++++++++++++++++ + libcody/server.cc | 28 ++++++++++++++-------------- + 3 files changed, 55 insertions(+), 31 deletions(-) + +diff --git a/libcody/client.cc b/libcody/client.cc +index ae69d190cb77..147fecdbe500 100644 +--- a/libcody/client.cc ++++ b/libcody/client.cc +@@ -97,7 +97,7 @@ int Client::CommunicateWithServer () + + static Packet CommunicationError (int err) + { +- std::string e {u8"communication error:"}; ++ std::string e {(const char *) u8"communication error:"}; + e.append (strerror (err)); + + return Packet (Client::PC_ERROR, std::move (e)); +@@ -110,33 +110,34 @@ Packet Client::ProcessResponse (std::vector &words, + { + if (e == EINVAL) + { +- std::string msg (u8"malformed string '"); ++ std::string msg ((const char *) u8"malformed string '"); + msg.append (words[0]); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + return Packet (Client::PC_ERROR, std::move (msg)); + } + else +- return Packet (Client::PC_ERROR, u8"missing response"); ++ return Packet (Client::PC_ERROR, (const char *) u8"missing response"); + } + + Assert (!words.empty ()); +- if (words[0] == u8"ERROR") ++ if (words[0] == (const char *) u8"ERROR") + return Packet (Client::PC_ERROR, +- words.size () == 2 ? words[1]: u8"malformed error response"); ++ words.size () == 2 ? words[1] ++ : (const char *) u8"malformed error response"); + + if (isLast && !read.IsAtEnd ()) + return Packet (Client::PC_ERROR, +- std::string (u8"unexpected extra response")); ++ std::string ((const char *) u8"unexpected extra response")); + + Assert (code < Detail::RC_HWM); + Packet result (responseTable[code] (words)); + result.SetRequest (code); + if (result.GetCode () == Client::PC_ERROR && result.GetString ().empty ()) + { +- std::string msg {u8"malformed response '"}; ++ std::string msg {(const char *) u8"malformed response '"}; + + read.LexedLine (msg); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + result.GetString () = std::move (msg); + } + else if (result.GetCode () == Client::PC_CONNECT) +@@ -199,7 +200,7 @@ Packet Client::Connect (char const *agent, char const *ident, + size_t alen, size_t ilen) + { + write.BeginLine (); +- write.AppendWord (u8"HELLO"); ++ write.AppendWord ((const char *) u8"HELLO"); + write.AppendInteger (Version); + write.AppendWord (agent, true, alen); + write.AppendWord (ident, true, ilen); +@@ -211,7 +212,8 @@ Packet Client::Connect (char const *agent, char const *ident, + // HELLO $version $agent [$flags] + Packet ConnectResponse (std::vector &words) + { +- if (words[0] == u8"HELLO" && (words.size () == 3 || words.size () == 4)) ++ if (words[0] == (const char *) u8"HELLO" ++ && (words.size () == 3 || words.size () == 4)) + { + char *eptr; + unsigned long val = strtoul (words[1].c_str (), &eptr, 10); +@@ -247,7 +249,7 @@ Packet Client::ModuleRepo () + // PATHNAME $dir | ERROR + Packet PathnameResponse (std::vector &words) + { +- if (words[0] == u8"PATHNAME" && words.size () == 2) ++ if (words[0] == (const char *) u8"PATHNAME" && words.size () == 2) + return Packet (Client::PC_PATHNAME, std::move (words[1])); + + return Packet (Client::PC_ERROR, u8""); +@@ -256,7 +258,7 @@ Packet PathnameResponse (std::vector &words) + // OK or ERROR + Packet OKResponse (std::vector &words) + { +- if (words[0] == u8"OK") ++ if (words[0] == (const char *) u8"OK") + return Packet (Client::PC_OK); + else + return Packet (Client::PC_ERROR, +@@ -319,11 +321,11 @@ Packet Client::IncludeTranslate (char const *include, Flags flags, size_t ilen) + // PATHNAME $cmifile + Packet IncludeTranslateResponse (std::vector &words) + { +- if (words[0] == u8"BOOL" && words.size () == 2) ++ if (words[0] == (const char *) u8"BOOL" && words.size () == 2) + { +- if (words[1] == u8"FALSE") +- return Packet (Client::PC_BOOL, 0); +- else if (words[1] == u8"TRUE") ++ if (words[1] == (const char *) u8"FALSE") ++ return Packet (Client::PC_BOOL); ++ else if (words[1] == (const char *) u8"TRUE") + return Packet (Client::PC_BOOL, 1); + else + return Packet (Client::PC_ERROR, u8""); +diff --git a/libcody/cody.hh b/libcody/cody.hh +index 789ce9e70b75..93bce93aa94d 100644 +--- a/libcody/cody.hh ++++ b/libcody/cody.hh +@@ -47,12 +47,21 @@ namespace Detail { + + // C++11 doesn't have utf8 character literals :( + ++#if __cpp_char8_t >= 201811 ++template ++constexpr char S2C (char8_t const (&s)[I]) ++{ ++ static_assert (I == 2, "only single octet strings may be converted"); ++ return s[0]; ++} ++#else + template + constexpr char S2C (char const (&s)[I]) + { + static_assert (I == 2, "only single octet strings may be converted"); + return s[0]; + } ++#endif + + /// Internal buffering class. Used to concatenate outgoing messages + /// and Lex incoming ones. +@@ -123,6 +132,13 @@ public: + Space (); + Append (str, maybe_quote, len); + } ++#if __cpp_char8_t >= 201811 ++ void AppendWord (char8_t const *str, bool maybe_quote = false, ++ size_t len = ~size_t (0)) ++ { ++ AppendWord ((const char *) str, maybe_quote, len); ++ } ++#endif + /// Add a word as with AppendWord + /// @param str the string to append + /// @param maybe_quote string might need quoting, as for Append +@@ -264,6 +280,12 @@ public: + : string (s), cat (STRING), code (c) + { + } ++#if __cpp_char8_t >= 201811 ++ Packet (unsigned c, const char8_t *s) ++ : string ((const char *) s), cat (STRING), code (c) ++ { ++ } ++#endif + Packet (unsigned c, std::vector &&v) + : vector (std::move (v)), cat (VECTOR), code (c) + { +diff --git a/libcody/server.cc b/libcody/server.cc +index e2fa069bb933..c18469fae843 100644 +--- a/libcody/server.cc ++++ b/libcody/server.cc +@@ -36,12 +36,12 @@ static RequestPair + const requestTable[Detail::RC_HWM] = + { + // Same order as enum RequestCode +- RequestPair {u8"HELLO", nullptr}, +- RequestPair {u8"MODULE-REPO", ModuleRepoRequest}, +- RequestPair {u8"MODULE-EXPORT", ModuleExportRequest}, +- RequestPair {u8"MODULE-IMPORT", ModuleImportRequest}, +- RequestPair {u8"MODULE-COMPILED", ModuleCompiledRequest}, +- RequestPair {u8"INCLUDE-TRANSLATE", IncludeTranslateRequest}, ++ RequestPair {(const char *) u8"HELLO", nullptr}, ++ RequestPair {(const char *) u8"MODULE-REPO", ModuleRepoRequest}, ++ RequestPair {(const char *) u8"MODULE-EXPORT", ModuleExportRequest}, ++ RequestPair {(const char *) u8"MODULE-IMPORT", ModuleImportRequest}, ++ RequestPair {(const char *) u8"MODULE-COMPILED", ModuleCompiledRequest}, ++ RequestPair {(const char *) u8"INCLUDE-TRANSLATE", IncludeTranslateRequest}, + }; + } + +@@ -135,21 +135,21 @@ void Server::ProcessRequests (void) + std::string msg; + + if (err > 0) +- msg = u8"error processing '"; ++ msg = (const char *) u8"error processing '"; + else if (ix >= Detail::RC_HWM) +- msg = u8"unrecognized '"; ++ msg = (const char *) u8"unrecognized '"; + else if (IsConnected () && ix == Detail::RC_CONNECT) +- msg = u8"already connected '"; ++ msg = (const char *) u8"already connected '"; + else if (!IsConnected () && ix != Detail::RC_CONNECT) +- msg = u8"not connected '"; ++ msg = (const char *) u8"not connected '"; + else +- msg = u8"malformed '"; ++ msg = (const char *) u8"malformed '"; + + read.LexedLine (msg); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + if (err > 0) + { +- msg.append (u8" "); ++ msg.append ((const char *) u8" "); + msg.append (strerror (err)); + } + resolver->ErrorResponse (this, std::move (msg)); +@@ -176,7 +176,7 @@ Resolver *ConnectRequest (Server *s, Resolver *r, + return nullptr; + + if (words.size () == 3) +- words.emplace_back (u8""); ++ words.emplace_back ((const char *) u8""); + unsigned version = ParseUnsigned (words[1]); + if (version == ~0u) + return nullptr; From patchwork Thu Apr 16 06:47:16 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86220 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0F67CF88075 for ; Thu, 16 Apr 2026 06:48:32 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7719.1776322109461407253 for ; Wed, 15 Apr 2026 23:48:29 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=J1fIq/bn; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43cff5dafc3so5430717f8f.1 for ; Wed, 15 Apr 2026 23:48:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322108; x=1776926908; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=9xfxOUvyf5rP0+FcG6K0whv60DNj4BWFYvbItdKejKA=; b=J1fIq/bnxLP4UjJ4zxewAC6iC3ySfrsmjrrlzu2mhGdw8CZJZfbstH0xMLh+D5Dv8M cGDKsLl5O1uFWRtNOqYIcQiB1wyEvP9nn4bxvYQmcbc44yyOqrBcjKQqnBKvxJjZFyHl 71Vg90eAkXkgQWHSQsb2fiSjkrATVF+2+JjpQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322108; x=1776926908; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=9xfxOUvyf5rP0+FcG6K0whv60DNj4BWFYvbItdKejKA=; b=ITgSgNY8kVYOtdC0A0gSYfYi8qz9k2QuNHyCqDG0A/WLfppKAb0LB/+BdEUEh6xUON a92zj8gxyrspavmZgbXtg9jBTYHJ02kfKvyo1pNQCJdSbjN5qGJZQ4JjIcpCFJBY8ME1 lTEn5+qjObM5t+HzmRIVp/el5eQFfgofXkI8b+UczTubXTr/BQAxpQoX0KW6m/jr0iWW 8w7buv6n8SnEL1DVl4DkQHjke2V8lTZ+ZTcmaSw+2miFgVTs5GRKVfCC+H4wCqzKkvqD H/veURbiOUOa9gRwT8zH0YOsyM3pLqzq8K3r2oPatyyJtUkNlsBzPDRDAt1Zg8zsc7z+ e84Q== X-Gm-Message-State: AOJu0Yxuw6Tm23ageU3IHWjVIY65BfWvUx9dCWu+GHxw2vA9Q/odhJ2u Kc5DxodE1AT/pyzccs5Q1HsPNQLqlfEykWlUfHYJNIQFBAdGnaBmhRfgVC4DBX1LI5K/r9SYInq +tLCmx9GmerpH X-Gm-Gg: AeBDieuSjlRlzulcEtBKCIKCJOalk2+/UZlVTMhx1Ca7USpBYXDrBJLDaptARbyPtha rVG6QrzMvJ7mpmuLcuVEJGuxruhnKfPvQH+Q4ffBgc5wnv0lzooPVD33BJ8+pg+/SWwdUkAJ00h JVKGUuxKa2xB0G+GnCDiENjqPksOv2OerZEfVA+rpEtqXWatf+/39GWGSBhpVi3hNy6RK2I6I0d aEyCLU28ksrkRCWglJSw6DDAkTYHz5iWoyi+t7jQxrKPd26iUDsGGaOiEvjWb1R9/lSeLIJA6B7 cMixXOdqHesreeBl9ESY5tNWmIokhE8BNBw7Tgru/ZrqZxLwHor1BAGdhvpmgmpTWANiS6a2eGf prMyMSXwPgkWL3oS5NYKQySHjYlDZLGC5gcyaXlmXi6SXSSEz9wm02L6O25liaP9trWN79zIkfB XCihP/P+jwyyHWRro5tunlrCH7b22fSqy2f6Knq0IKBBCGXYKAbSL0D/TXLbnRm8LrjFIrQXcdg U1wfHElY26bfbELln4qzdlSAhXb3aeKgfVH0jwc9uhghTQ4 X-Received: by 2002:a05:6000:2305:b0:43d:7c6c:a0dd with SMTP id ffacd0b85a97d-43d7c6ca2c1mr19799040f8f.35.1776322107536; Wed, 15 Apr 2026 23:48:27 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:27 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 15/47] barebox/barebox-tools: upgrade 2025.09.0 -> 2025.09.3 Date: Thu, 16 Apr 2026 08:47:16 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235357 From: Ankur Tyagi 2025.09.3 --------- Fixed FIT image vulnerability https://lore.barebox.org/barebox/abljJRMecNdejSD0@pengutronix.de/ Changelog: https://github.com/barebox/barebox/compare/v2025.09.2...v2025.09.3 2025.09.2 --------- Changelog: https://github.com/barebox/barebox/compare/v2025.09.1...v2025.09.2 2025.09.1 --------- This stable release is specifically targeted at whinlatter which is currently at v2025.09.0 https://lore.barebox.org/barebox/aUkaSKDePHF8__LB@pengutronix.de/ Changelog: https://github.com/barebox/barebox/compare/v2025.09.0...v2025.09.1 Signed-off-by: Ankur Tyagi Signed-off-by: Yoann Congal --- meta/recipes-bsp/barebox/barebox-common.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-bsp/barebox/barebox-common.inc b/meta/recipes-bsp/barebox/barebox-common.inc index e41d0858fd9..91865b4d44c 100644 --- a/meta/recipes-bsp/barebox/barebox-common.inc +++ b/meta/recipes-bsp/barebox/barebox-common.inc @@ -3,6 +3,6 @@ SECTION = "bootloaders" LIC_FILES_CHKSUM = "file://COPYING;md5=f5125d13e000b9ca1f0d3364286c4192" -PV = "2025.09.0" +PV = "2025.09.3" SRC_URI = "https://barebox.org/download/barebox-${PV}.tar.bz2" -SRC_URI[sha256sum] = "7df1aa47bb7bf1763a729137ac773e69a4052812af094475d739fc63a9295f0d" +SRC_URI[sha256sum] = "e87eb863cbe45e4f5af8930825c8f6e20c02b82451e9e1125ea1c73c1fb49a87" From patchwork Thu Apr 16 06:47:17 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86212 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8208BF88063 for ; Thu, 16 Apr 2026 06:48:31 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7720.1776322110646256721 for ; Wed, 15 Apr 2026 23:48:30 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=icr3Ahv+; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43d73352cf2so3798701f8f.1 for ; Wed, 15 Apr 2026 23:48:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322109; x=1776926909; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0n9FjqaiKYxFXQPW+GkL0tGMIOvJf7FGucVcrl0XFDk=; b=icr3Ahv+3WS434Jwut53DglcN4enqA/KF8LT+6DSsKvimHtv80NtuLemiTC7sc6qxd hJlOX9UQczdooVabM463cvWG4trW1M7JHwG+kfdcM4C71781a6wFqUvlOegZ9iwIljMj l/URwBuAXF14d47N7qusLUEUDMviTpmIyc5zA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322109; x=1776926909; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0n9FjqaiKYxFXQPW+GkL0tGMIOvJf7FGucVcrl0XFDk=; b=m8ELYtSSrfPxieNHHZL51Wh06YRhEVojLH3oFjhsHZIG+jPy+Om8wsJv/JXi19EGS1 tVcxloW76VibLxYTvfzAJXpU4tHJK1xSCpo53Zy9qhbr7pDeXh0QJA9t0hiS6IifuQ2q TpgesBapysFM24fb6Qii5UR1Q0UMtlOzlpnMoI95HqYEXqQcAfsIOkS164RbThdeomKm xi1PJqVCLyQBXomdN9FFMu7Loh2infvk45oNi4G+ip7HsJFaqCgfNCqK64CQMC7j2jO8 O3Znpf4c0qZox9GDMewFSsA1rZKyMvyfdt6gyFuM7yht93PSQm0KGNPnft2gG264ySc7 Xnkg== X-Gm-Message-State: AOJu0Yy0cpOHNymPeHlUA0ibKB+7Y2Nf8BIlDC5SK0PsiedL2CHgU3kN CIPWAZmxHJJ7TI6nTnKPyMgjKMq7O2cK5Y2nYn/GfUXWYNGNSYry9gV4ndEVawiVIwiaWuJ7MT7 14iEQmqUhUN88 X-Gm-Gg: AeBDieuIyLibizyD5RwV6fkeDlJmKTEV7R9nRILTe4az0VNRmJ3tiiQwkAzdDgO3rVl oC+cbxDRN/GQcqRHrS/OWouEEBXuaACWyWJsNT65v6Fm5hMsi7jqDATN+rKrqFU9cDA862WIrtJ dew7Sus9U/ZkL7GiREaJACyaGJv80UWd4h4U8BqA7sLNgL1gaKc6rnGBZ2oLjMBT9o1NKSDP9yO jeKmRbF/BaOUp37tX7PFuPXXPXwXxX2ds3zJnR5Gi1V5Px1UDA1v/PMW8t22TnPnaQaTTYUKC8C dcaeOMKO1/p8wuzpUWGg1UM1VXSg2YPTR2DkThAgbLn7Msa8iCmVSECG6EQI/ASvayZKTXmzAkf KJHyO/e6d/Hf4cvm/0VjpkYNcb2g0kFO3qt08uWtMBiW4Rfsoqd+dV3fU0KD5hLlaRqfCS+Rg9N mgZwtunAN5keIJQ2OjpndF55+NEeHhSz9IcDv9mtWzjGeAxw2N2X5mn7zk9tdjk4ro1TNNwQVpB WolyLvpMKyPPq7JBRmRDmo/kCa+Jj8bxccbSA== X-Received: by 2002:a05:6000:605:b0:43d:7b90:fa2a with SMTP id ffacd0b85a97d-43d7b90fe46mr22095423f8f.3.1776322108518; Wed, 15 Apr 2026 23:48:28 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:27 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 16/47] openssl: upgrade 3.5.5 -> 3.5.6 Date: Thu, 16 Apr 2026 08:47:17 +0200 Message-ID: <0f6e3b8446558a471e38d4e76b105014512853dc.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235358 From: Peter Marko Release information [1]: OpenSSL 3.5.6 is a security patch release. The most severe CVE fixed in this release is Medium. This release incorporates the following bug fixes and mitigations: * Fixed incorrect failure handling in RSA KEM RSASVE encapsulation. (CVE-2026-31790) * Fixed loss of key agreement group tuple structure when the DEFAULT keyword is used in the server-side configuration of the key-agreement group list. (CVE-2026-2673) * Fixed potential use-after-free in DANE client code. (CVE-2026-28387) * Fixed NULL pointer dereference when processing a delta CRL. (CVE-2026-28388) * Fixed possible NULL dereference when processing CMS KeyAgreeRecipientInfo. (CVE-2026-28389) * Fixed possible NULL dereference when processing CMS KeyTransportRecipientInfo. (CVE-2026-28390) * Fixed heap buffer overflow in hexadecimal conversion. (CVE-2026-31789) [1] https://github.com/openssl/openssl/blob/openssl-3.5/NEWS.md#major-changes-between-openssl-355-and-openssl-356-7-apr-2026 Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit fc25ce383ddcb1185c193ff2b10f9116741eb316) Signed-off-by: Yoann Congal --- ...1-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch | 2 +- .../openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-connectivity/openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} (99%) diff --git a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch index dadc034c913..bfbfedbd67e 100644 --- a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch +++ b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch @@ -38,7 +38,7 @@ diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tm index 09303c4..011bda1 100644 --- a/Configurations/unix-Makefile.tmpl +++ b/Configurations/unix-Makefile.tmpl -@@ -513,13 +513,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (), +@@ -514,13 +514,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (), '$(CNF_LDFLAGS)', '$(LDFLAGS)') -} BIN_EX_LIBS=$(CNF_EX_LIBS) $(EX_LIBS) diff --git a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb similarity index 99% rename from meta/recipes-connectivity/openssl/openssl_3.5.5.bb rename to meta/recipes-connectivity/openssl/openssl_3.5.6.bb index c0d02b617ba..cbe7ed144e0 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb @@ -19,7 +19,7 @@ SRC_URI:append:class-nativesdk = " \ file://environment.d-openssl.sh \ " -SRC_URI[sha256sum] = "b28c91532a8b65a1f983b4c28b7488174e4a01008e29ce8e69bd789f28bc2a89" +SRC_URI[sha256sum] = "deae7c80cba99c4b4f940ecadb3c3338b13cb77418409238e57d7f31f2a3b736" inherit lib_package multilib_header multilib_script ptest perlnative manpages MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash" From patchwork Thu Apr 16 06:47:18 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86224 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 50052F8807F for ; Thu, 16 Apr 2026 06:48:32 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7579.1776322111257314787 for ; Wed, 15 Apr 2026 23:48:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KpX06+sL; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a29e6110so80098775e9.3 for ; Wed, 15 Apr 2026 23:48:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322109; x=1776926909; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r3uz/IBC8WoEl6OgkTCty9zioKhFMNZuwF2w6RxRGuE=; b=KpX06+sLZSb670wsjj4RTY8PhaQuVozU42+u4DCupN6iXrNRur0T5Rlu+05YnO3xWC CsUJ1TvNUsW6EdvilQqiB8afTV93q/pwc4vOwAsyulMy8KNk8ht3tsofylz8pohuy6hu YZ8qFc7PRR9BHpyOG6wpteMlbhij42Aevlm40= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322109; x=1776926909; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=r3uz/IBC8WoEl6OgkTCty9zioKhFMNZuwF2w6RxRGuE=; b=P4hW9bEcNfPvKgr8OBYSIg0OhIVUATCQTTWdEN+v/ibcPaKzGaHuAjzlXKfYy+T1z8 f1djXNAmVWge06ca8p/k8WCvbbr0LoGemqrS/KRFanhjE7CMPvkyDzqjWA4idVeXd1tC yLqFdKEPTtxo05RtQEajd/iDBCxkx0PxY/bTwMGAjpcxpP5ux3604k1Gb1ueBvDBLcAF lYi32COAHUmVHZETniCB41llAF7QHJEV7m1fWb+CKe1pp2g6ogSzFGPMd8RKeMvXFGWQ IHz0RiBS5ofQw7oMpjH+sn1oy3c+eCjBTW2CR+/XscWbOuuMMzBhjr7DyvDpVl1q6FwU Utrg== X-Gm-Message-State: AOJu0YxBmR2Ufd3LCYP0ea4GxJgwelnHBVtTPYaWCL2QhAf/5k56APSe RD4vs9mbE1brz0+x+V5EVYrjXLfiLXS4YqxBgUXJXQmYYn8hrXjZDM70+x0J9j0sIkyeBJENS6k fETfdCLz1sPB7 X-Gm-Gg: AeBDievDqSSZdx0r34trCYRwZOAeWtrBWOOhn8UdE1PDlsSosUugAAADw6IA0Ezrk4y 1AF6ioxLzdlcy5i15rtLjhVwo78PUR89ed9yiBEWBBhcdZcGd8+5MTu+w9gxL1wT6/B0AXnPn1t bsLjX2b/da3iRaH1Dp0yi0hD0+vne65pRCsBnhDw9xNCIzeYs7S3v/0plzkZ3oJ2GL69D9fQKB7 hk+q8z01CwSOXY6HS4oRJdFTYr6GMFcS96pPekIkviuvtZEPwMiYRjVrnVipJcDcJ0PHxnoCUdF ET2ENtdT2iLF9cgbJxSMOVbantYkxxSPUFAnP/mrhaWvCutRIh4qUonii4F1Wj6W6dBx6ZRmY+d Y1cJYxIzhCuDC8r4anSAZk00TgVWjivA7iVw+oE/l6gqQupVvkcB/cQbfmBRASzbwdtWEtpX1jc D71GDLVhuUK6k/NBbKCz9DwDsqDHJm/ayloX3aCY7Fpap/CtFvbGRcSSL3eeNkz4fiFxI/Gsstr KjXD7IqAf4HdzN3TgfrSTONFXjuMru67O8tRg== X-Received: by 2002:a05:600c:474c:b0:485:35d3:ce59 with SMTP id 5b1f17b1804b1-488d68101edmr316629135e9.10.1776322109251; Wed, 15 Apr 2026 23:48:29 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:28 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 17/47] go: upgrade 1.25.8 -> 1.25.9 Date: Thu, 16 Apr 2026 08:47:18 +0200 Message-ID: <3be4eeea60a52b8694ae0688d794bb44991ae634.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235359 From: Peter Marko Upgrade to latest 1.25.x release [1]: $ git --no-pager log --oneline go1.25.8..go1.25.9 7076e01d9d (tag: go1.25.9) [release-branch.go1.25] go1.25.9 abaa0cbb25 [release-branch.go1.25] cmd/go: disallow cgo trust boundary bypass 02f574a830 [release-branch.go1.25] crypto/tls: prevent deadlock when client sends multiple key update messages 82b0cdb741 [release-branch.go1.25] archive/tar: limit the number of old GNU sparse format entries 7d2dd3488c [release-branch.go1.25] cmd/compile: fix loopbce overflow check logic 72cc33629a [release-branch.go1.25] cmd/compile: fix mem access overlap detection 3ed3169244 [release-branch.go1.25] html/template: properly track JS template literal brace depth across contexts 4c79c4223e [release-branch.go1.25] internal/syscall/unix: properly support AT_SYMLINK_NOFOLLOW on Linux edc1e4a5f2 [release-branch.go1.25] crypto/x509: fix signature checking limit 210b8112b1 [release-branch.go1.25] crypto/x509: hoist policy pruning out of loop 93a4f03ed8 [release-branch.go1.25] runtime/race: apply LLVM zero-initialization fix cff64a5cf3 [release-branch.go1.25] cmd/go: tests: rename git-min-vers->git-sha256 7301bd39d1 [release-branch.go1.25] cmd/go: skip git sha256 tests if git < 2.29 f9532f001a [release-branch.go1.25] test/fixedbugs: remove issue46234 test timeout 4f81fbf332 [release-branch.go1.25] doc: remove template use in godebug.md aed39507b1 [release-branch.go1.25] cmd/go/internal/cache: update trim timestamp before trimming 9a6627a5db [release-branch.go1.25] crypto/x509: fix wildcard domain exclusions. 19c660de6b [release-branch.go1.25] cmd/compile/internal/typecheck: simplify tcSliceHeader b02c84a684 [release-branch.go1.25] cmd/internal/testdir: pass -buildid to link command 814b540c17 [release-branch.go1.25] cmd/internal/testdir: unify link command de86eaeb0f [release-branch.go1.25] cmd/cgo/internal/test: use (syntactic) constant for C array bound Fixes CVE-2026-32282, CVE-2026-32289, CVE-2026-27144, CVE-2026-27143, CVE-2026-32288, CVE-2026-32283, CVE-2026-27140, CVE-2026-32280 and CVE-2026-32281. Release information: [2] [1] https://github.com/golang/go/compare/go1.25.8...go1.25.9 [2] https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU Signed-off-by: Peter Marko Signed-off-by: Yoann Congal --- meta/recipes-devtools/go/{go-1.25.8.inc => go-1.25.9.inc} | 2 +- ...binary-native_1.25.8.bb => go-binary-native_1.25.9.bb} | 6 +++--- ...oss-canadian_1.25.8.bb => go-cross-canadian_1.25.9.bb} | 0 .../go/{go-cross_1.25.8.bb => go-cross_1.25.9.bb} | 0 .../go/{go-crosssdk_1.25.8.bb => go-crosssdk_1.25.9.bb} | 0 .../go/{go-runtime_1.25.8.bb => go-runtime_1.25.9.bb} | 0 ...go-make-content-based-hash-generation-less-pedan.patch | 8 ++++---- .../go/0006-cmd-go-make-GOROOT-precious-by-default.patch | 2 +- meta/recipes-devtools/go/{go_1.25.8.bb => go_1.25.9.bb} | 0 9 files changed, 9 insertions(+), 9 deletions(-) rename meta/recipes-devtools/go/{go-1.25.8.inc => go-1.25.9.inc} (91%) rename meta/recipes-devtools/go/{go-binary-native_1.25.8.bb => go-binary-native_1.25.9.bb} (79%) rename meta/recipes-devtools/go/{go-cross-canadian_1.25.8.bb => go-cross-canadian_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go-cross_1.25.8.bb => go-cross_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go-crosssdk_1.25.8.bb => go-crosssdk_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go-runtime_1.25.8.bb => go-runtime_1.25.9.bb} (100%) rename meta/recipes-devtools/go/{go_1.25.8.bb => go_1.25.9.bb} (100%) diff --git a/meta/recipes-devtools/go/go-1.25.8.inc b/meta/recipes-devtools/go/go-1.25.9.inc similarity index 91% rename from meta/recipes-devtools/go/go-1.25.8.inc rename to meta/recipes-devtools/go/go-1.25.9.inc index 5db1b1c04cb..9a96f6f1704 100644 --- a/meta/recipes-devtools/go/go-1.25.8.inc +++ b/meta/recipes-devtools/go/go-1.25.9.inc @@ -18,4 +18,4 @@ SRC_URI += "\ file://0011-cmd-link-stop-forcing-binutils-gold-dependency-on-aa.patch \ file://0001-runtime-when-using-cgo-on-386-call-C-sigaction-funct.patch \ " -SRC_URI[main.sha256sum] = "e988d4a2446ac7fe3f6daa089a58e9936a52a381355adec1c8983230a8d6c59e" +SRC_URI[main.sha256sum] = "0ec9ef8ebcea097aac37decae9f09a7218b451cd96be7d6ed513d8e4bcf909cf" diff --git a/meta/recipes-devtools/go/go-binary-native_1.25.8.bb b/meta/recipes-devtools/go/go-binary-native_1.25.9.bb similarity index 79% rename from meta/recipes-devtools/go/go-binary-native_1.25.8.bb rename to meta/recipes-devtools/go/go-binary-native_1.25.9.bb index df6cb542fb6..b11b822c946 100644 --- a/meta/recipes-devtools/go/go-binary-native_1.25.8.bb +++ b/meta/recipes-devtools/go/go-binary-native_1.25.9.bb @@ -9,9 +9,9 @@ PROVIDES = "go-native" # Checksums available at https://go.dev/dl/ SRC_URI = "https://dl.google.com/go/go${PV}.${BUILD_GOOS}-${BUILD_GOARCH}.tar.gz;name=go_${BUILD_GOTUPLE}" -SRC_URI[go_linux_amd64.sha256sum] = "ceb5e041bbc3893846bd1614d76cb4681c91dadee579426cf21a63f2d7e03be6" -SRC_URI[go_linux_arm64.sha256sum] = "7d137f59f66bb93f40a6b2b11e713adc2a9d0c8d9ae581718e3fad19e5295dc7" -SRC_URI[go_linux_ppc64le.sha256sum] = "28ed144a945e4d7188c93f8d85fb772a98ed18f8f9f8d3a650696b739f8cc57c" +SRC_URI[go_linux_amd64.sha256sum] = "00859d7bd6defe8bf84d9db9e57b9a4467b2887c18cd93ae7460e713db774bc1" +SRC_URI[go_linux_arm64.sha256sum] = "ec342e7389b7f489564ed5463c63b16cf8040023dabc7861256677165a8c0e2b" +SRC_URI[go_linux_ppc64le.sha256sum] = "b0c41c7da1fc8d39020d65296a0dc54167afd9f76d67064e22c31ce3d839a739" UPSTREAM_CHECK_URI = "https://golang.org/dl/" UPSTREAM_CHECK_REGEX = "go(?P\d+(\.\d+)+)\.linux" diff --git a/meta/recipes-devtools/go/go-cross-canadian_1.25.8.bb b/meta/recipes-devtools/go/go-cross-canadian_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross-canadian_1.25.8.bb rename to meta/recipes-devtools/go/go-cross-canadian_1.25.9.bb diff --git a/meta/recipes-devtools/go/go-cross_1.25.8.bb b/meta/recipes-devtools/go/go-cross_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-cross_1.25.8.bb rename to meta/recipes-devtools/go/go-cross_1.25.9.bb diff --git a/meta/recipes-devtools/go/go-crosssdk_1.25.8.bb b/meta/recipes-devtools/go/go-crosssdk_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-crosssdk_1.25.8.bb rename to meta/recipes-devtools/go/go-crosssdk_1.25.9.bb diff --git a/meta/recipes-devtools/go/go-runtime_1.25.8.bb b/meta/recipes-devtools/go/go-runtime_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go-runtime_1.25.8.bb rename to meta/recipes-devtools/go/go-runtime_1.25.9.bb diff --git a/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch b/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch index 6d75266cbe6..921e59c4a20 100644 --- a/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch +++ b/meta/recipes-devtools/go/go/0001-cmd-go-make-content-based-hash-generation-less-pedan.patch @@ -109,7 +109,7 @@ index 7b073165d5..1f618be0bb 100644 } // Configuration specific to compiler toolchain. -@@ -2639,8 +2641,25 @@ func envList(key, def string) []string { +@@ -2636,8 +2638,25 @@ func envList(key, def string) []string { return args } @@ -136,7 +136,7 @@ index 7b073165d5..1f618be0bb 100644 if cppflags, err = buildFlags("CPPFLAGS", "", p.CgoCPPFLAGS, checkCompilerFlags); err != nil { return } -@@ -2656,6 +2675,13 @@ func (b *Builder) CFlags(p *load.Package) (cppflags, cflags, cxxflags, fflags, l +@@ -2653,6 +2672,13 @@ func (b *Builder) CFlags(p *load.Package) (cppflags, cflags, cxxflags, fflags, l if ldflags, err = buildFlags("LDFLAGS", DefaultCFlags, p.CgoLDFLAGS, checkLinkerFlags); err != nil { return } @@ -150,7 +150,7 @@ index 7b073165d5..1f618be0bb 100644 return } -@@ -2673,7 +2699,7 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo +@@ -2670,7 +2696,7 @@ func (b *Builder) cgo(a *Action, cgoExe, objdir string, pcCFLAGS, pcLDFLAGS, cgo p := a.Package sh := b.Shell(a) @@ -159,7 +159,7 @@ index 7b073165d5..1f618be0bb 100644 if err != nil { return nil, nil, err } -@@ -3237,7 +3263,7 @@ func (b *Builder) swigOne(a *Action, file, objdir string, pcCFLAGS []string, cxx +@@ -3238,7 +3264,7 @@ func (b *Builder) swigOne(a *Action, file, objdir string, pcCFLAGS []string, cxx p := a.Package sh := b.Shell(a) diff --git a/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch b/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch index 15ffdb3cf38..4ac478be851 100644 --- a/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch +++ b/meta/recipes-devtools/go/go/0006-cmd-go-make-GOROOT-precious-by-default.patch @@ -94,7 +94,7 @@ index 1f618be0bb..651fa64582 100644 if err := sh.Mkdir(a.Objdir); err != nil { return err } -@@ -1739,6 +1756,14 @@ func (b *Builder) linkShared(ctx context.Context, a *Action) (err error) { +@@ -1736,6 +1753,14 @@ func (b *Builder) linkShared(ctx context.Context, a *Action) (err error) { return err } diff --git a/meta/recipes-devtools/go/go_1.25.8.bb b/meta/recipes-devtools/go/go_1.25.9.bb similarity index 100% rename from meta/recipes-devtools/go/go_1.25.8.bb rename to meta/recipes-devtools/go/go_1.25.9.bb From patchwork Thu Apr 16 06:47:19 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86234 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 14A63F8808B for ; Thu, 16 Apr 2026 06:48:43 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7721.1776322111939921639 for ; Wed, 15 Apr 2026 23:48:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wN+tz5M1; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so101082735e9.2 for ; Wed, 15 Apr 2026 23:48:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322110; x=1776926910; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=szp4dFfHWgjV6v2/N/AVo3ctLJaHSGVnwRidzPVQiO0=; b=wN+tz5M1tP6TPVg/qpQWKiWZX+pGRpsKXqHWlTNNwB5XRuSJQOC3MzDePyGtJ8trIA 9gEiPDxSrAFxxgaQ/XjrAOskB1B7KvEjOAXKGuUDxJ+nTfMN3ZVn4/UDJNg43cweugzw vxy34fQEuvlP7IMbGTaijnWT7f3oza5kusLEI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322110; x=1776926910; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=szp4dFfHWgjV6v2/N/AVo3ctLJaHSGVnwRidzPVQiO0=; b=A/0i54S1G8dfvMBn8IoFgOUTd5AqRdua+aInXYt1NnCZq3B8y0Xhf3FB45B+IeSfBp FI7vf3ZF6lZAIeFGUwYm1J8F8WscRGZOoXrWb/Ieo3lZWtAZdmGe9+UoZupkM7rlqVb+ Te+K4uQ4crkgHM1dqchE92u5GtAbsF/ZKshf9eKbQPFKX+oghWPoRhihedfY7hgm5Mcl IAI21T+OCHaW6ZGlXIBTrkZEmCvzL8IAucNdAm/B8Cb8TTwI8QzP9+M8RAxJ7JUGgD9r ig9SWU8lKkYu4TvUrpYsWVtrkOOOBp8rYwsKJbh9HQ1vv5FLHkAN5KDHZJKgQrnpCMeV /pdg== X-Gm-Message-State: AOJu0YzY3paq4EcRROZ9tragMzEbLuvUQSoIklwrjnV4n4cPyCYNijfR 4esaZcA4Y3jjDVuA7DE7lH6P1+8IsxVWNMUmO8pynIiKG4MC/waiXGB5PTBIeEf8kurBQ5zfe6S PluTq0Ii5s1+B X-Gm-Gg: AeBDietVu+fLmeIhwiSiJ8oYf5hn/na79mNGk5t9EZb8thnrNEfO7jsbLmiEqP5mbci x/e7lyl8kd/a0Hl2LdFfkg9zH/eyYn7d7yScfnX1eef78CPhIp/3DK0pae6DhB2bf/ywPW7uQtZ tC690J1aMDntQzTwVZZG8WxA36tqq9mfUTr5pl6v54pavut0MI689obwLFqKL+QAfUM7YEeqBIi 9dH7Q05tSvfdwAIxWxFQ4femGo9p4ChE4hbKjvzm+rFwVAf4SGsuXCBGX1bKHT/R/7Bt50dFT9n k7/5Gf7ao3V6X1GeDAMZHBDJwkrEVJScfgPQzOdSMbyuEKGGMYMs7iQjsj+J1qtacqjvQGbyM+1 ecy1C+Aq7SzbehzbtXdN3UCaMvQp61/762/lIOKyBApwBeNK3MR05uZpyeL6/jwgtBXga/XUM4l DeC0CTHh0ti+z4qmUxD82+FqRnwMuQZOqy7/JuL7prTo8kOEVj+DE3lfsL7LrwelgHuC3NWbMFJ AE41KqMZIQOECUq3AXKOHnzQRph8jIky+yerQ== X-Received: by 2002:a05:600c:c0da:b0:487:1fc:14f9 with SMTP id 5b1f17b1804b1-488d685b7c9mr289610385e9.15.1776322109877; Wed, 15 Apr 2026 23:48:29 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:29 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 18/47] dtc: backport fix for build with glibc-2.43 Date: Thu, 16 Apr 2026 08:47:19 +0200 Message-ID: <47668754cd6829c8687d1ceebce35ba4442fd40f.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235360 From: Martin Jansa glibc-2.43 isn't used in OE builds yet, but this fixes dtc-native: https://errors.yoctoproject.org/Errors/Details/903983/ ../sources/dtc-1.7.2/libfdt/fdt_overlay.c: In function ‘overlay_fixup_phandle’: ../sources/dtc-1.7.2/libfdt/fdt_overlay.c:424:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 424 | sep = memchr(fixup_str, ':', fixup_len); | ^ ../sources/dtc-1.7.2/libfdt/fdt_overlay.c:434:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 434 | sep = memchr(name, ':', fixup_len); | ^ cc1: all warnings being treated as errors Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 28552a7b6c94060c7ab3899619ab8afb74124d02) [YC: fixed the Upstream-Status Backport URL] Signed-off-by: Yoann Congal --- .../0001-Fix-discarded-const-qualifiers.patch | 83 +++++++++++++++++++ meta/recipes-kernel/dtc/dtc_1.7.2.bb | 1 + 2 files changed, 84 insertions(+) create mode 100644 meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch diff --git a/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch new file mode 100644 index 00000000000..de06ab37231 --- /dev/null +++ b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch @@ -0,0 +1,83 @@ +From c58beee7bec0774f12202511c97beb741ff2b534 Mon Sep 17 00:00:00 2001 +From: Stephen Gallagher +Date: Tue, 6 Jan 2026 14:19:30 -0500 +Subject: [PATCH] Fix discarded const qualifiers + +It's unsafe to implicitly discard the const qualifier on a pointer. In +overlay_fixup_phandle(), this was probably just an oversight, and making +the "sep" variable a const char * is sufficient to fix it. + +In create_node(), however, the "p" variable is directly modifying the +buffer pointed to by "const char* node_name". To fix this, we need to +actually make a duplicate of the buffer and operate on that instead. + +This introduces a malloc()/free() and an unbounded strdup() into the +operation, but fdtput isn't a long-running service and the node_name +argument comes directly from argv, so this shouldn't introduce a +significant performance impact. + +Signed-off-by: Stephen Gallagher +Signed-off-by: David Gibson +Signed-off-by: Martin Jansa +Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/commit/?h=main&id=9a1c801a1a3c102bf95c5339c9e985b26b823a21] +--- + fdtput.c | 8 +++++--- + libfdt/fdt_overlay.c | 3 ++- + meson.build | 1 + + 3 files changed, 8 insertions(+), 4 deletions(-) + +diff --git a/fdtput.c b/fdtput.c +index c2fecf4..8deec7e 100644 +--- a/fdtput.c ++++ b/fdtput.c +@@ -230,19 +230,21 @@ static int create_paths(char **blob, const char *in_path) + static int create_node(char **blob, const char *node_name) + { + int node = 0; +- char *p; ++ const char *p; ++ char *path = NULL; + + p = strrchr(node_name, '/'); + if (!p) { + report_error(node_name, -1, -FDT_ERR_BADPATH); + return -1; + } +- *p = '\0'; + + *blob = realloc_node(*blob, p + 1); + + if (p > node_name) { +- node = fdt_path_offset(*blob, node_name); ++ path = xstrndup(node_name, (size_t)(p - node_name)); ++ node = fdt_path_offset(*blob, path); ++ free(path); + if (node < 0) { + report_error(node_name, -1, node); + return -1; +diff --git a/libfdt/fdt_overlay.c b/libfdt/fdt_overlay.c +index 28b667f..5f8aa62 100644 +--- a/libfdt/fdt_overlay.c ++++ b/libfdt/fdt_overlay.c +@@ -409,7 +409,8 @@ static int overlay_fixup_phandle(void *fdt, void *fdto, int symbols_off, + const char *fixup_str = value; + uint32_t path_len, name_len; + uint32_t fixup_len; +- char *sep, *endptr; ++ const char *sep; ++ char *endptr; + int poffset, ret; + + fixup_end = memchr(value, '\0', len); +diff --git a/meson.build b/meson.build +index 310699f..2966b06 100644 +--- a/meson.build ++++ b/meson.build +@@ -18,6 +18,7 @@ add_project_arguments( + '-Wshadow', + '-Wsuggest-attribute=format', + '-Wwrite-strings', ++ '-Wdiscarded-qualifiers', + ]), + language: 'c' + ) diff --git a/meta/recipes-kernel/dtc/dtc_1.7.2.bb b/meta/recipes-kernel/dtc/dtc_1.7.2.bb index 92e83a94044..b8b79542c5d 100644 --- a/meta/recipes-kernel/dtc/dtc_1.7.2.bb +++ b/meta/recipes-kernel/dtc/dtc_1.7.2.bb @@ -10,6 +10,7 @@ LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ SRC_URI = " \ git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ + file://0001-Fix-discarded-const-qualifiers.patch \ " SRCREV = "2d10aa2afe35527728db30b35ec491ecb6959e5c" From patchwork Thu Apr 16 06:47:20 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86238 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2061DF8808C for ; Thu, 16 Apr 2026 06:48:43 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7580.1776322112408029441 for ; Wed, 15 Apr 2026 23:48:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=2m1JLGpz; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso91625825e9.2 for ; Wed, 15 Apr 2026 23:48:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322110; x=1776926910; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WVhU4dd0fSKGFFw3DxJjyGrc8CGImTlTcAo7+1C/Vwg=; b=2m1JLGpzi3vDyyxeup0DwXBPQIfEolAX1doU3ieYN7AfIKfhCPfLPdKS+cMiRElJwb h5kOBZuQ8b/YNX83z83gUwy67DnO9tTuXopvNMI7795qYNGG5qtxkbuBHh9aOAVpnFbA FlL+jNhhMD43oRs+zYQwd/r6kHEJM4BUECx0Y= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322110; x=1776926910; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WVhU4dd0fSKGFFw3DxJjyGrc8CGImTlTcAo7+1C/Vwg=; b=LFO1N8mZ5gQ1kuv+idmkJwjp29IEhhq+OHk956WaRuh1mbq3LNG2SRYXmVCex8x27w pRbVq3vi4Y1zhyHs8yQFg5Je200QErLb+3q1upUJmaR24HPOFpTsTR9MX1zoSxn4yi72 syfwAsa6ryKViuPxXo7SBsmXkfysmNb+e0ozTpPkorFMoQ/rOPl7jWE2RgROyvf8lv2/ ekl1hCGei71u5JpOqlYhhHoPAXqmKsyQ+IWZavC9T6gVxNhKEipkg9qWltNpZWs/tO/v GdcN9XiEGAsE5aMwA1nTNZV+f64cPs4pF4D0QwKn5iwdSi5W8LTYjhnACo1s+UrrOZgW zQjQ== X-Gm-Message-State: AOJu0YyLgDNVgE7l9mbc+ac//9F7joshr95LohIUf8fhYB0YBBUAEUu+ DbnBblHi36Tn7ovam5r5rVAMnnCF9JSnR3iI8P/fj2kXLeIPnKOp7qgEEqnHmUUicx8sZv68M8/ FfpzKizSnjA1g X-Gm-Gg: AeBDiet0HL5/iEvYf/X3aUmejXshV6byBPeJsoyITtxIubuk02DHrawAk//5Jyr2h9D W8xqpx4+F2nNH/YBTLxMHrMe/Fsyl3+rtEysTY1AGH+jC2OzN3bOyi0StOTR4B2hJHgiQlXcfjW bXmizrpoe25DOUActzQ24ZvSwLvXuhjQ272961DxWm9PTm07kjzR6UiDhPSFOQm+HP210qZg3Np iAUVavfKmmhUXMCV5r6qbJ8vVhwS8Syj0pm6X64uwkmXzET5qmm5XFL7HcQZtpynZVWQTrKaWku ROBJoa0CZWs6RjKm8e1C8OldZm7/DZw8fcHKH5MQxNcOmezZ4arJckOObKss6ViA2kIa0COIOH5 32Twt7H+qMepqZLyKB492ES3NffFKMwXeWlwU4C6QqrNnGLmkfFOLxkdut+WgifcMWpkF47RnOU Zdn4RWhG86A90AqnGDYVlpvvjNc0I3CnX4ScLhln055pKRKMkLa1UTToTY0db5AmhZ2rpEZGXGr X2d3UMicJDSfq8zQIZtb1r/yZ76zLudDeMygA== X-Received: by 2002:a05:600c:c088:b0:488:a98b:b891 with SMTP id 5b1f17b1804b1-488d67bf75amr251849795e9.3.1776322110494; Wed, 15 Apr 2026 23:48:30 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:30 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 19/47] pseudo: Add fix for glibc 2.43 Date: Thu, 16 Apr 2026 08:47:20 +0200 Message-ID: <10cf0fc5f2a18ac377186c3013a50d1355b41312.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235361 From: Richard Purdie Update to add a fix for a function definition to work with glibc 2.43. Signed-off-by: Richard Purdie (cherry picked from commit 7d35b0e7929d666af783db835a3a809f8f6ce429) Signed-off-by: Yoann Congal --- meta/recipes-devtools/pseudo/pseudo_git.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index a26a205a160..4d316299033 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,7 +12,7 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "43cbd8fb4914328094ccdb4bb827d74b1bac2046" +SRCREV = "56e1f8df4761da60e41812fc32b1de797d1765e9" PV = "1.9.3+git" # largefile and 64bit time_t support adds these macros via compiler flags globally From patchwork Thu Apr 16 06:47:21 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86227 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A0A71F8807D for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7722.1776322113051977686 for ; Wed, 15 Apr 2026 23:48:33 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ruc96Y/5; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43cf7683a28so5119479f8f.2 for ; Wed, 15 Apr 2026 23:48:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322111; x=1776926911; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=SNnr8zCuK9rJCkrulyG7Tv1QtQHZbFJT4AbUSi4SIIA=; b=ruc96Y/5+6wfHQcLnjuRJrvo7N4c3gQIfGZiEZBzXFREDdg1eApUc5iTXvS+onUwMJ fVWRGry67SRc7PrDXEbxquK40wdlZ9GstNHWWMBERjDZ8wQ/5icRaTk9lA4Nkje52pBd phvXFZ8ATtifzL/x9ZVH1k9NsBrTGaIAXyTqc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322111; x=1776926911; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=SNnr8zCuK9rJCkrulyG7Tv1QtQHZbFJT4AbUSi4SIIA=; b=chMVrsMos5jys/osn92K4im3rrKOr2eaKuCybxdgUbyBIu/FBbffMoLsHuQQeRjyZk UN3eTWy1MUPl9oKv/2mNs4s9pXqx8YCfJRNobB3Fg7IVWpGYm8qrkxINBKJvsi1SC+WT a5MfWbfWIqzGbA9TEScOsn9OUw/KhSM9uUxHD+lNBT2NmcQw8oJ/kEaR3FdJMIAZBUFE xMF50Z2piprBzTM2Szf+IBGmh7T6NULg9ZrDwrokynrAtvTXO8SdOaB4MfK+jYxb1RIi KLfHHvpsaiAfR8r6uzpThiLMbHU0K8nr8J8hitNBGnkV1aUoPfI6yEvS4IkwFIcGzxlX P8fQ== X-Gm-Message-State: AOJu0YwFVgcIW763nDCeI2UBL0UkQm3+jQgBIKZ/B4L/wq8e5j1XGrKX Byocbqtx6zuCi4HK1OUqVpbInsVfm1oszrt6WSlFBfs+e6oCpz0hwqlgwbcO2LIH0zShZThukWo o/ObijNbr7OS0 X-Gm-Gg: AeBDievQtyQ09DHQcaErn2UeX0BZzv0krf4Zp1fyXkJKf4b/E+HIzG3gJQl88AmdT/U QQL8L540MhdjFoNW278zbPTnvmiGY0UeylWfhoYnDA1RWAWf7BUqQlMfjeScqIVEIzeAsynq8ti JPuPL0NJagLy/pMMe4VKGQJn2JKYDARExnBTSDvCzZyY37ygXhJEzEAQNgQAoG2ip41l2/cUQq0 tJWwH3QIkUD4LPmT+etox6ob6biX7szr2hhaLyAMcjpWGdmXE0/5K6folJM9Mz2ecsW00RgwsDk 2BqFZzeCtvYitWZrBEx073c2Hjf5CqpJBnBn3tU8yzX/oacWHIACVbd5uI7ZFiNSTR83lySGkrp TVPQ2R8wwIduXpY2TW2GD2BrSMifQqDkKC0HHnKy1qPg8R/iUxQmJcyovA13PLofB9xpyrBVdgI JSZ2eHFyMCj3oSn0JbL2Ci+s3PSETEA4ZeKeY+vhNATZ4sx9lDZn/7xtuqg/019yt2XzSX3l0Sm gVhY6KjzgGyAOQu7QZvf8mW5scUgu57DaS18Q== X-Received: by 2002:a05:6000:200f:b0:43b:9a9f:8956 with SMTP id ffacd0b85a97d-43d6428e889mr34835286f8f.22.1776322110994; Wed, 15 Apr 2026 23:48:30 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:30 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 20/47] yocto-uninative: Update to 5.1 for glibc 2.43 Date: Thu, 16 Apr 2026 08:47:21 +0200 Message-ID: <11ce247a4e165fde70992a6899d9a55b691a4dcd.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235362 From: Michael Halstead Signed-off-by: Michael Halstead Signed-off-by: Richard Purdie (cherry picked from commit c1fb515f2a88fa0a0e95529afc07a99db001af0e) [YC: fix duplicated line in commit message] Signed-off-by: Yoann Congal --- meta/conf/distro/include/yocto-uninative.inc | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc index e9dc6c86408..d97c96f631f 100644 --- a/meta/conf/distro/include/yocto-uninative.inc +++ b/meta/conf/distro/include/yocto-uninative.inc @@ -6,10 +6,10 @@ # to the distro running on the build machine. # -UNINATIVE_MAXGLIBCVERSION = "2.42" -UNINATIVE_VERSION = "5.0" +UNINATIVE_MAXGLIBCVERSION = "2.43" +UNINATIVE_VERSION = "5.1" UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/" -UNINATIVE_CHECKSUM[aarch64] ?= "a25f2174d0cefcb22af005e9bc72ac01ae83b011c5b6d6d5bf00dac979877f76" -UNINATIVE_CHECKSUM[i686] ?= "959cc2539b692f9b9862825c7324a0fe4d061fca742f6c259f67f581c59af956" -UNINATIVE_CHECKSUM[x86_64] ?= "96045e8b1e242c8a849426a8506c7043f354b39f2bc0035192780e8205e23e9d" +UNINATIVE_CHECKSUM[aarch64] ?= "4166237a9dabd222dcb9627a9435dffd756764fabf76ed7ef2e93dc2964567ad" +UNINATIVE_CHECKSUM[i686] ?= "761502cc9aef4d54d0c6fe9418beb9fdd2c6220da6f2b04128c89f47902ab9ae" +UNINATIVE_CHECKSUM[x86_64] ?= "2b63a078c26535e0786e87f81ae69509df30f4dce40693004c527bd5e4ab2b85" From patchwork Thu Apr 16 06:47:22 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86237 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DB9B0F88084 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f68.google.com (mail-wr1-f68.google.com [209.85.221.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7581.1776322114029430931 for ; Wed, 15 Apr 2026 23:48:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=FxPOP1HJ; spf=pass (domain: smile.fr, ip: 209.85.221.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f68.google.com with SMTP id ffacd0b85a97d-43d7650202fso3335745f8f.2 for ; Wed, 15 Apr 2026 23:48:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322112; x=1776926912; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xg97HcAxyKl7CWH+m5fikwRL/8UGeav6UcucMGD73Ys=; b=FxPOP1HJQCnIr5p1GjJ+Dt9KomTEAkgC7Nd7Mz2tlrsDvnxJszlQoxDoJvwLaR0vdq mQ3eo3H+0bfXPn+ynH6NFTZ06f7dyEixpAXkmB3CChoTW9t8fwUvqPtvqd4FGMaZ8XWb Lb0iDr/Onph22IQIjBBaM7wLx3QoGxqt7/peg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322112; x=1776926912; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=xg97HcAxyKl7CWH+m5fikwRL/8UGeav6UcucMGD73Ys=; b=I6DhDmYqKZKzOR928Lgv4imXSzLBFj/g/up0YLqA/XGzQTHi32M1YYU5NfM1rDHW9n rftwb3XTqcCSVbzjhU7luGjIB8iHanVK3zqEYZ785VOYOtDCLVV1tfatBClsVr1vNoZ7 A3wbhuFIj3HTei+YCT+ud4ydrEXqWkjPoFr0io2nihDMf2YSWSHQ9Qq7w3hI30bDg1YE v2fljfPTlNqjZnI661BjTfIYHx4UuiMtHy0oTdRTtFwRTt6UBAE+ldWRdu5rIsgrISHE Ydz8uAYPvBRy8iMqhHt/3TxFCOa1hXvNT4uyhEDjNu/TPtO26hFWtdR9O2Rb8hMhTna8 WhxQ== X-Gm-Message-State: AOJu0YyMNGtPovOTNN2UVeRPn7UiK8zokETXAlYockfUDWic21AC1FSw FJuWtWAyzWgSUP2N3C0CYmx+uiGBxnVP1bEHNChUWJPsos5KZggdUE8WO0Wo4gjJcX2XXOAp0v4 KkY3aOF8yJKsb X-Gm-Gg: AeBDieszLYRP5CNOtto0WQV71ByIIXb8l0PKiujGhHxZM2KZHjfaVWwmJajGFVAtQ4l BxGhikTIf+3W2aNCH64Hpx6tLDnXLnxsYd/BsI8W5MXel3sbQxO2IPH6Deei7rAAimYmAX1v9HC rvrQQhdwmcN6tQI3mqNtMzz2PogX6+dxQcC4jsA+EjW7OKpvkWzWNBzuIvZipjqBDXCijtYZ0sn 6OH1Tg9hlgWMjN5cybda/3BBvTMzVCsopQ8hfXQIYi/RxMTgF2+gNRa05hqByXPXRPBerfXx3zK vqbiOKn/LpfAvZercb4GaWYKXL4cHk/IMC21rrZ1RJkQOY5ZagNhqCjDy8ChLQD9ewD48JPLGBr 1Bk1ZB1t4HGNC2rV2KwCc32hymRd+jL+McwPqLn70cVrz6/eWPushfZeqhjqvpzlRsnhh1lYk5s JGLQXI5a8Y2O/2JSkWxLtw8YiTanK4MaQd1GeZOEcfJ3LtCc3lsOTalfUl6RvO2YIgKpAMM8tpJ 2IvTlUU8tAOaoHJvAaV7xNUbK8ducWNNTHpXw== X-Received: by 2002:a05:6000:144d:b0:43e:a69b:d803 with SMTP id ffacd0b85a97d-43ea69bda93mr13821221f8f.47.1776322111670; Wed, 15 Apr 2026 23:48:31 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:31 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 21/47] m4: backport 3 gnulib changes to fix build with glibc-2.43 on host Date: Thu, 16 Apr 2026 08:47:22 +0200 Message-ID: <7daef08b2bd4fb852169939e0eaa0486e204d230.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235363 From: Martin Jansa All 3 are already included in m4-1.4.21 used in master. Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-devtools/m4/m4-1.4.20.inc | 3 + ...-Fix-some-g-Wsystem-headers-warnings.patch | 135 ++++++++++++ ...pilation-error-on-macOS-with-fortify.patch | 126 ++++++++++++ ...23-qualifier-generic-fns-like-strchr.patch | 194 ++++++++++++++++++ 4 files changed, 458 insertions(+) create mode 100644 meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch create mode 100644 meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch create mode 100644 meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch diff --git a/meta/recipes-devtools/m4/m4-1.4.20.inc b/meta/recipes-devtools/m4/m4-1.4.20.inc index 5c4ba09288c..df47e1e1881 100644 --- a/meta/recipes-devtools/m4/m4-1.4.20.inc +++ b/meta/recipes-devtools/m4/m4-1.4.20.inc @@ -8,6 +8,9 @@ inherit autotools texinfo ptest gettext SRC_URI = "${GNU_MIRROR}/m4/m4-${PV}.tar.gz \ file://0001-gettext-h-Avoid-gcc-Wformat-security-warnings-with-d.patch \ + file://0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch \ + file://0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch \ + file://0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch \ " SRC_URI:append:class-target = " file://run-ptest \ file://0001-test-c32ispunct-Check-for-musl-along-with-glibc.patch \ diff --git a/meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch b/meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch new file mode 100644 index 00000000000..63495a8443e --- /dev/null +++ b/meta/recipes-devtools/m4/m4/0001-string-h-wchar-h-Fix-some-g-Wsystem-headers-warnings.patch @@ -0,0 +1,135 @@ +From a9ff1a1ea55bee12751c751460a0102493fa65aa Mon Sep 17 00:00:00 2001 +From: Bruno Haible +Date: Mon, 12 May 2025 03:05:51 +0200 +Subject: [PATCH] string-h, wchar-h: Fix some g++ -Wsystem-headers warnings. + +* lib/string.in.h (memcpy, memccpy, memmove, strncpy, strndup, strncat, +memcmp, strncmp, memset): On glibc systems, declare with +_GL_ATTRIBUTE_NOTHROW. +* lib/wchar.in.h (wmemcpy, wmemmove, wcsncpy, wcsncat, wmemcmp, wcsncmp, +wmemset): Likewise. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=0614c2db34f65c595d85be4adc5628778905855a] +Signed-off-by: Martin Jansa +--- + lib/string.in.h | 27 +++++++++++++++++++++++++++ + lib/wchar.in.h | 21 +++++++++++++++++++++ + 2 files changed, 48 insertions(+) + +diff --git a/lib/string.in.h b/lib/string.in.h +index e764221..e3d94b7 100644 +--- a/lib/string.in.h ++++ b/lib/string.in.h +@@ -215,25 +215,49 @@ _GL_EXTERN_C void free (void *); + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ + _GL_EXTERN_C void *memcpy (void *__dest, const void *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C void *memccpy (void *__dest, const void *__src, int __c, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 4) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 4); + _GL_EXTERN_C void *memmove (void *__dest, const void *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C char *strncpy (char *__dest, const char *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C char *strndup (const char *__s, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 2); + _GL_EXTERN_C char *strncat (char *__dest, const char *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ARG_NONNULL ((1)) _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int memcmp (const void *__s1, const void *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int strncmp (const char *__s1, const char *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +@@ -243,6 +267,9 @@ _GL_EXTERN_C void *memrchr (const void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C void *memset (void *__s, int __c, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + _GL_EXTERN_C void *memset_explicit (void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); +diff --git a/lib/wchar.in.h b/lib/wchar.in.h +index 8836ed1..a6c52eb 100644 +--- a/lib/wchar.in.h ++++ b/lib/wchar.in.h +@@ -281,20 +281,38 @@ _GL_EXTERN_C void free (void *); + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ + _GL_EXTERN_C wchar_t *wmemcpy (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C wchar_t *wmemmove (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C wchar_t *wcsncpy (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C wchar_t *wcsncat (wchar_t *__dest, const wchar_t *__src, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ARG_NONNULL ((1)) _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int wmemcmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +@@ -302,6 +320,9 @@ _GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++ _GL_ATTRIBUTE_NOTHROW ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + #endif + diff --git a/meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch b/meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch new file mode 100644 index 00000000000..ef7117997b5 --- /dev/null +++ b/meta/recipes-devtools/m4/m4/0002-string-h-Fix-compilation-error-on-macOS-with-fortify.patch @@ -0,0 +1,126 @@ +From 84b6bcb2c691796d87b47bfcf815409ca2b9e461 Mon Sep 17 00:00:00 2001 +From: Bruno Haible +Date: Thu, 10 Jul 2025 11:04:50 +0200 +Subject: [PATCH] string-h: Fix compilation error on macOS with fortify. + +Reported by Pierre Ossman at +. + +* lib/string.in.h (memcpy etc.): Don't redeclare functions that are +declared as macros. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=c44fe03b72687c9e913727724c29bdb49c1f86e3] +Signed-off-by: Martin Jansa +--- + lib/string.in.h | 58 +++++++++++++++++++++++++++++++++---------------- + 1 file changed, 39 insertions(+), 19 deletions(-) + +diff --git a/lib/string.in.h b/lib/string.in.h +index e3d94b7..9a039c7 100644 +--- a/lib/string.in.h ++++ b/lib/string.in.h +@@ -214,65 +214,85 @@ _GL_EXTERN_C void free (void *); + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ ++# ifndef memcpy + _GL_EXTERN_C void *memcpy (void *__dest, const void *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef memccpy + _GL_EXTERN_C void *memccpy (void *__dest, const void *__src, int __c, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 4) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 4); ++# endif ++# ifndef memmove + _GL_EXTERN_C void *memmove (void *__dest, const void *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef strncpy + _GL_EXTERN_C char *strncpy (char *__dest, const char *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef strndup + _GL_EXTERN_C char *strndup (const char *__s, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 2); ++# endif ++# ifndef strncat + _GL_EXTERN_C char *strncat (char *__dest, const char *__src, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ARG_NONNULL ((1)) _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef memcmp + _GL_EXTERN_C int memcmp (const void *__s1, const void *__s2, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); ++# endif ++# ifndef strncmp + _GL_EXTERN_C int strncmp (const char *__s1, const char *__s2, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); +-# ifndef __cplusplus ++# endif ++# if !defined memchr && !defined __cplusplus + _GL_EXTERN_C void *memchr (const void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + _GL_EXTERN_C void *memrchr (const void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif ++# ifndef memset + _GL_EXTERN_C void *memset (void *__s, int __c, size_t __n) +-# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 ++# if __GLIBC__ + (__GLIBC_MINOR__ >= 2) > 2 + _GL_ATTRIBUTE_NOTHROW +-# endif ++# endif + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); ++# endif ++# ifndef memset_explicit + _GL_EXTERN_C void *memset_explicit (void *__s, int __c, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); ++# endif + #endif + + diff --git a/meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch b/meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch new file mode 100644 index 00000000000..7d88e45fa58 --- /dev/null +++ b/meta/recipes-devtools/m4/m4/0003-Port-to-C23-qualifier-generic-fns-like-strchr.patch @@ -0,0 +1,194 @@ +From 100cbc40da39dcdf259ebce2bd0f2b4889cf2204 Mon Sep 17 00:00:00 2001 +From: Paul Eggert +Date: Sun, 23 Nov 2025 00:50:40 -0800 +Subject: [PATCH] Port to C23 qualifier-generic fns like strchr +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +This ports Gnulib to strict C23 platforms that reject code +like ‘char *q = strchr (P, 'x');’ when P is a pointer to const, +because in C23 strchr is a qualifier-generic function so +strchr (P, 'x') returns char const *. +This patch does not attempt to do the following two things, +which might be useful in the future: +1. When compiling on non-C23 platforms, check user code for +portability to platforms that define qualifier-generic functions. +2. Port Gnulib to platforms that have qualifier-generic functions +not listed in the C23 standard, e.g., strchrnul. I don’t know +of any such platforms. +* lib/argp-help.c (argp_doc): +* lib/c-strstr.c (c_strstr): +* lib/dfa.c (comsubs): +* lib/mbschr.c (mbschr): +* lib/mbspbrk.c (mbspbrk): +* lib/mbsrchr.c (mbsrchr): +* lib/memchr2.c (memchr2): +* lib/string-desc.c (_sd_index): +* tests/test-bsearch.c (lib_bsearch): +* tests/test-memchr.c (lib_memchr): +* tests/test-wmemchr.c (lib_wmemchr): +Port to C23, where functions like strchr are qualifier-generic. +* lib/c++defs.h (_GL_FUNCDECL_SYS_NAME): New macro. +* lib/c++defs.h (_GL_FUNCDECL_SYS): +* lib/stdlib.in.h (bsearch): +Use it, to prevent C23 names like strchr from acting like macros. +* lib/string.in.h (memchr, strchr, strpbrk, strrchr): +Do not #undef when GNULIB_POSIXCHECK is defined, as this could +cause conforming C23 code to fail to conform. It’s not clear why +_GL_WARN_ON_USE_CXX; perhaps it was needed but isn’t any more? +But for now, limit the removal of #undef to these four functions +where #undeffing is clearly undesirable in C23. +* lib/wchar.in.h (wmemchr): Parenthesize function name in decl, +to prevent it from acting like a macro. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=df17f4f37ed3ca373d23ad42eae51122bdb96626] +Signed-off-by: Martin Jansa +--- + lib/c++defs.h | 12 +++++++++++- + lib/memchr2.c | 2 +- + lib/stdlib.in.h | 6 +++--- + lib/string.in.h | 4 ---- + lib/wchar.in.h | 2 +- + tests/c++defs.h | 12 +++++++++++- + 6 files changed, 27 insertions(+), 11 deletions(-) + +diff --git a/lib/c++defs.h b/lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/lib/c++defs.h ++++ b/lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/lib/memchr2.c b/lib/memchr2.c +index 7493823..d7724ae 100644 +--- a/lib/memchr2.c ++++ b/lib/memchr2.c +@@ -55,7 +55,7 @@ memchr2 (void const *s, int c1_in, int c2_in, size_t n) + c2 = (unsigned char) c2_in; + + if (c1 == c2) +- return memchr (s, c1, n); ++ return (void *) memchr (s, c1, n); + + /* Handle the first few bytes by reading one byte at a time. + Do this until VOID_PTR is aligned on a longword boundary. */ +diff --git a/lib/stdlib.in.h b/lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/lib/stdlib.in.h ++++ b/lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/lib/string.in.h b/lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/lib/string.in.h ++++ b/lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/lib/wchar.in.h b/lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/lib/wchar.in.h ++++ b/lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/tests/c++defs.h b/tests/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/tests/c++defs.h ++++ b/tests/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func From patchwork Thu Apr 16 06:47:23 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86240 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1CE1FF8808E for ; Thu, 16 Apr 2026 06:48:43 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7582.1776322114813685152 for ; Wed, 15 Apr 2026 23:48:35 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=gTmTEdkt; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43cf8d550bdso6944222f8f.0 for ; Wed, 15 Apr 2026 23:48:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322113; x=1776926913; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0xkN5pXYq4S9tJ6G2jyPolGCL8m5EMu7PU/ueOMMNCk=; b=gTmTEdkthhJ28n7d7BseB4hSDiYD6NjoF8g1OWK8skknlZmTIyRiXdmBRUcXRDDvfi 8xb7pH8cYCs3pOjMsoGAWVPb/0BiK4VIa40FqrzhvX8LX1u8ej4JzLcx7h2+wqUmNcg6 rrL48YnemsGpKWek7WPay5k4MQqhs8aMkWpFE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322113; x=1776926913; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0xkN5pXYq4S9tJ6G2jyPolGCL8m5EMu7PU/ueOMMNCk=; b=oFrN10hZ6xy/g7FNjmhByVq3sZcj1ByT+cQ/krgeO6gMfQzhEDp8JMlIyfstkBuGv1 hh3YQIBLXJFi9Y1JM9WkVl0ta16qhnC/ZUo6t/wUsK0ER2/nuYn8yhIW9upd7bF0IWzs Ijlfhbh6XMHDxC20Ukm5NUxxfaFhLrQmOE+a4+B+d717Vo1InIMvH2fPSam9b2KSbeWY 7+6z9O8MD2q1eH333FZ+NhBITO4D1DCTb3RJ41z2hblJ5XCykV66RfvAy+Xhkx7aScQk 5D51y6YKfdazGERo+SkdtITzelxW9XWUanoYUTYINV5JGZuVICdCpHBNxppb85/kbY3g 0f2w== X-Gm-Message-State: AOJu0YwVvIrp3/3izoOiWHYWdZio/hGhtCHIfAbEKmGlwK7Q/vRJwUoU 5OTtbIrsQ5eTIKeSHKIJJvazrWOhCzP4DXrBbXaPYONiwfnqwOMqJOVdTn0S8WI8EuYNT0nuWvA CTTbiMEN9Qnz5 X-Gm-Gg: AeBDiesX0v5T8ZURV2svw6I4xb8IEMrvbH7Mu8tgWScN78EhxYPeGBuWoREt4SGag/w lIG5xZ2Q/xMnTHev2Y/U2++ytQ3tkf2KpgXa12rFWU7KKTR6LnUbvcaDwwCmgub9AX+9CUsZ7ay heoHv3Uq9f/H0SGD+BQE1p6Ofbw/jG76j8J5BORn0sntyq7RHS1fT0yyD3H60nulPqMwl/b7MDb /v2+D9dd1Nwsal/zwT/nxUbbByrqWuuNvkOm4eCIomZ6h+uUBmZYqJprO9Fdyg4OSRrSCVmyEAP QjHTEMGIbj44sBoUCbhQ1APIVyWMGLK/9FomcuZ4RxVhY9D3cr2gVr4wsW4dLd80gHT/3j85mV5 AdiN6AY/mBb6Fo6NWrHYaNi6c1kRzTr6WO9sl9UNA68zdx25dzVFafj1JLawHWVnMFtGzP++9GZ j6PvNZmJOVjW7y1zAX16kIRCLTYN9yblAg8fQPmf3ZVWoFV2vEd2VUfF9L1LrJg7mxpJWulePih 77UMmYCgkuNDB2ME9yaGttBoBkd2MscztxuBQ== X-Received: by 2002:a05:6000:186e:b0:43e:a70d:7622 with SMTP id ffacd0b85a97d-43ea70d791amr13787197f8f.22.1776322112348; Wed, 15 Apr 2026 23:48:32 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:31 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 22/47] gettext: backport gnulib changes to fix build with glibc-2.43 on host Date: Thu, 16 Apr 2026 08:47:23 +0200 Message-ID: <1d44eef557bbac27a527a4f37eb80badedcb9082.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235364 From: Martin Jansa It's already included in gettext-1.0 used in master. Unfortunately this need to be applied in 6 different copies of gnulib inside gettext repo. Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- ...23-qualifier-generic-fns-like-strchr.patch | 626 ++++++++++++++++++ meta/recipes-core/gettext/gettext_0.26.bb | 1 + 2 files changed, 627 insertions(+) create mode 100644 meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch diff --git a/meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch b/meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch new file mode 100644 index 00000000000..634e17ea788 --- /dev/null +++ b/meta/recipes-core/gettext/gettext/0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch @@ -0,0 +1,626 @@ +From 64c9525e8664ec3b89475100cbeda06ed916e707 Mon Sep 17 00:00:00 2001 +From: Paul Eggert +Date: Sun, 23 Nov 2025 00:50:40 -0800 +Subject: [PATCH] Port to C23 qualifier-generic fns like strchr +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +This ports Gnulib to strict C23 platforms that reject code +like ‘char *q = strchr (P, 'x');’ when P is a pointer to const, +because in C23 strchr is a qualifier-generic function so +strchr (P, 'x') returns char const *. +This patch does not attempt to do the following two things, +which might be useful in the future: +1. When compiling on non-C23 platforms, check user code for +portability to platforms that define qualifier-generic functions. +2. Port Gnulib to platforms that have qualifier-generic functions +not listed in the C23 standard, e.g., strchrnul. I don’t know +of any such platforms. +* lib/argp-help.c (argp_doc): +* lib/c-strstr.c (c_strstr): +* lib/dfa.c (comsubs): +* lib/mbschr.c (mbschr): +* lib/mbspbrk.c (mbspbrk): +* lib/mbsrchr.c (mbsrchr): +* lib/memchr2.c (memchr2): +* lib/string-desc.c (_sd_index): +* tests/test-bsearch.c (lib_bsearch): +* tests/test-memchr.c (lib_memchr): +* tests/test-wmemchr.c (lib_wmemchr): +Port to C23, where functions like strchr are qualifier-generic. +* lib/c++defs.h (_GL_FUNCDECL_SYS_NAME): New macro. +* lib/c++defs.h (_GL_FUNCDECL_SYS): +* lib/stdlib.in.h (bsearch): +Use it, to prevent C23 names like strchr from acting like macros. +* lib/string.in.h (memchr, strchr, strpbrk, strrchr): +Do not #undef when GNULIB_POSIXCHECK is defined, as this could +cause conforming C23 code to fail to conform. It’s not clear why +_GL_WARN_ON_USE_CXX; perhaps it was needed but isn’t any more? +But for now, limit the removal of #undef to these four functions +where #undeffing is clearly undesirable in C23. +* lib/wchar.in.h (wmemchr): Parenthesize function name in decl, +to prevent it from acting like a macro. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/gnulib.git/commit/?id=df17f4f37ed3ca373d23ad42eae51122bdb96626] +Signed-off-by: Martin Jansa +--- + gettext-runtime/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-runtime/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-runtime/gnulib-lib/string.in.h | 4 ---- + gettext-runtime/gnulib-lib/wchar.in.h | 2 +- + gettext-runtime/intl/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-runtime/intl/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-runtime/intl/gnulib-lib/string.in.h | 4 ---- + gettext-runtime/intl/gnulib-lib/wchar.in.h | 2 +- + gettext-tools/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-tools/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-tools/gnulib-lib/string.in.h | 4 ---- + gettext-tools/gnulib-lib/wchar.in.h | 2 +- + gettext-tools/libgettextpo/c++defs.h | 12 +++++++++++- + gettext-tools/libgettextpo/stdlib.in.h | 6 +++--- + gettext-tools/libgettextpo/string.in.h | 4 ---- + gettext-tools/libgettextpo/wchar.in.h | 2 +- + gettext-tools/libgrep/gnulib-lib/c++defs.h | 12 +++++++++++- + gettext-tools/libgrep/gnulib-lib/memchr2.c | 2 +- + gettext-tools/libgrep/gnulib-lib/stdlib.in.h | 6 +++--- + gettext-tools/libgrep/gnulib-lib/wchar.in.h | 2 +- + libtextstyle/lib/c++defs.h | 12 +++++++++++- + libtextstyle/lib/stdlib.in.h | 6 +++--- + libtextstyle/lib/string.in.h | 4 ---- + libtextstyle/lib/wchar.in.h | 2 +- + 24 files changed, 91 insertions(+), 51 deletions(-) + +diff --git a/gettext-runtime/gnulib-lib/c++defs.h b/gettext-runtime/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-runtime/gnulib-lib/c++defs.h ++++ b/gettext-runtime/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-runtime/gnulib-lib/stdlib.in.h b/gettext-runtime/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-runtime/gnulib-lib/stdlib.in.h ++++ b/gettext-runtime/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-runtime/gnulib-lib/string.in.h b/gettext-runtime/gnulib-lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-runtime/gnulib-lib/string.in.h ++++ b/gettext-runtime/gnulib-lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-runtime/gnulib-lib/wchar.in.h b/gettext-runtime/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-runtime/gnulib-lib/wchar.in.h ++++ b/gettext-runtime/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-runtime/intl/gnulib-lib/c++defs.h b/gettext-runtime/intl/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-runtime/intl/gnulib-lib/c++defs.h ++++ b/gettext-runtime/intl/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-runtime/intl/gnulib-lib/stdlib.in.h b/gettext-runtime/intl/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-runtime/intl/gnulib-lib/stdlib.in.h ++++ b/gettext-runtime/intl/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-runtime/intl/gnulib-lib/string.in.h b/gettext-runtime/intl/gnulib-lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-runtime/intl/gnulib-lib/string.in.h ++++ b/gettext-runtime/intl/gnulib-lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-runtime/intl/gnulib-lib/wchar.in.h b/gettext-runtime/intl/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-runtime/intl/gnulib-lib/wchar.in.h ++++ b/gettext-runtime/intl/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-tools/gnulib-lib/c++defs.h b/gettext-tools/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-tools/gnulib-lib/c++defs.h ++++ b/gettext-tools/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-tools/gnulib-lib/stdlib.in.h b/gettext-tools/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-tools/gnulib-lib/stdlib.in.h ++++ b/gettext-tools/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-tools/gnulib-lib/string.in.h b/gettext-tools/gnulib-lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-tools/gnulib-lib/string.in.h ++++ b/gettext-tools/gnulib-lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-tools/gnulib-lib/wchar.in.h b/gettext-tools/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-tools/gnulib-lib/wchar.in.h ++++ b/gettext-tools/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-tools/libgettextpo/c++defs.h b/gettext-tools/libgettextpo/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-tools/libgettextpo/c++defs.h ++++ b/gettext-tools/libgettextpo/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-tools/libgettextpo/stdlib.in.h b/gettext-tools/libgettextpo/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-tools/libgettextpo/stdlib.in.h ++++ b/gettext-tools/libgettextpo/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-tools/libgettextpo/string.in.h b/gettext-tools/libgettextpo/string.in.h +index 9a039c7..bc44f81 100644 +--- a/gettext-tools/libgettextpo/string.in.h ++++ b/gettext-tools/libgettextpo/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/gettext-tools/libgettextpo/wchar.in.h b/gettext-tools/libgettextpo/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-tools/libgettextpo/wchar.in.h ++++ b/gettext-tools/libgettextpo/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/gettext-tools/libgrep/gnulib-lib/c++defs.h b/gettext-tools/libgrep/gnulib-lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/gettext-tools/libgrep/gnulib-lib/c++defs.h ++++ b/gettext-tools/libgrep/gnulib-lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/gettext-tools/libgrep/gnulib-lib/memchr2.c b/gettext-tools/libgrep/gnulib-lib/memchr2.c +index 7493823..d7724ae 100644 +--- a/gettext-tools/libgrep/gnulib-lib/memchr2.c ++++ b/gettext-tools/libgrep/gnulib-lib/memchr2.c +@@ -55,7 +55,7 @@ memchr2 (void const *s, int c1_in, int c2_in, size_t n) + c2 = (unsigned char) c2_in; + + if (c1 == c2) +- return memchr (s, c1, n); ++ return (void *) memchr (s, c1, n); + + /* Handle the first few bytes by reading one byte at a time. + Do this until VOID_PTR is aligned on a longword boundary. */ +diff --git a/gettext-tools/libgrep/gnulib-lib/stdlib.in.h b/gettext-tools/libgrep/gnulib-lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/gettext-tools/libgrep/gnulib-lib/stdlib.in.h ++++ b/gettext-tools/libgrep/gnulib-lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/gettext-tools/libgrep/gnulib-lib/wchar.in.h b/gettext-tools/libgrep/gnulib-lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/gettext-tools/libgrep/gnulib-lib/wchar.in.h ++++ b/gettext-tools/libgrep/gnulib-lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) +diff --git a/libtextstyle/lib/c++defs.h b/libtextstyle/lib/c++defs.h +index df98a5a..d3dfabd 100644 +--- a/libtextstyle/lib/c++defs.h ++++ b/libtextstyle/lib/c++defs.h +@@ -127,6 +127,16 @@ + #define _GL_FUNCDECL_RPL_1(rpl_func,rettype,parameters,...) \ + _GL_EXTERN_C_FUNC __VA_ARGS__ rettype rpl_func parameters + ++/* _GL_FUNCDECL_SYS_NAME (func) expands to plain func if C++, and to ++ parenthsized func otherwise. Parenthesization is needed in C23 if ++ the function is like strchr and so is a qualifier-generic macro ++ that expands to something more complicated. */ ++#ifdef __cplusplus ++# define _GL_FUNCDECL_SYS_NAME(func) func ++#else ++# define _GL_FUNCDECL_SYS_NAME(func) (func) ++#endif ++ + /* _GL_FUNCDECL_SYS (func, rettype, parameters, [attributes]); + declares the system function, named func, with the given prototype, + consisting of return type, parameters, and attributes. +@@ -139,7 +149,7 @@ + _GL_FUNCDECL_SYS (posix_openpt, int, (int flags), _GL_ATTRIBUTE_NODISCARD); + */ + #define _GL_FUNCDECL_SYS(func,rettype,parameters,...) \ +- _GL_EXTERN_C_FUNC __VA_ARGS__ rettype func parameters ++ _GL_EXTERN_C_FUNC __VA_ARGS__ rettype _GL_FUNCDECL_SYS_NAME (func) parameters + + /* _GL_CXXALIAS_RPL (func, rettype, parameters); + declares a C++ alias called GNULIB_NAMESPACE::func +diff --git a/libtextstyle/lib/stdlib.in.h b/libtextstyle/lib/stdlib.in.h +index 1342db4..3548d6e 100644 +--- a/libtextstyle/lib/stdlib.in.h ++++ b/libtextstyle/lib/stdlib.in.h +@@ -237,9 +237,9 @@ _GL_INLINE_HEADER_BEGIN + + /* Declarations for ISO C N3322. */ + #if defined __GNUC__ && __GNUC__ >= 15 && !defined __clang__ +-_GL_EXTERN_C void *bsearch (const void *__key, +- const void *__base, size_t __nmemb, size_t __size, +- int (*__compare) (const void *, const void *)) ++_GL_EXTERN_C void *_GL_FUNCDECL_SYS_NAME (bsearch) ++ (const void *__key, const void *__base, size_t __nmemb, size_t __size, ++ int (*__compare) (const void *, const void *)) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3) _GL_ARG_NONNULL ((5)); + _GL_EXTERN_C void qsort (void *__base, size_t __nmemb, size_t __size, + int (*__compare) (const void *, const void *)) +diff --git a/libtextstyle/lib/string.in.h b/libtextstyle/lib/string.in.h +index 9a039c7..bc44f81 100644 +--- a/libtextstyle/lib/string.in.h ++++ b/libtextstyle/lib/string.in.h +@@ -403,7 +403,6 @@ _GL_CXXALIASWARN1 (memchr, void const *, + _GL_CXXALIASWARN (memchr); + # endif + #elif defined GNULIB_POSIXCHECK +-# undef memchr + /* Assume memchr is always declared. */ + _GL_WARN_ON_USE (memchr, "memchr has platform-specific bugs - " + "use gnulib module memchr for portability" ); +@@ -653,7 +652,6 @@ _GL_WARN_ON_USE (stpncpy, "stpncpy is unportable - " + #if defined GNULIB_POSIXCHECK + /* strchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strchr + /* Assume strchr is always declared. */ + _GL_WARN_ON_USE_CXX (strchr, + const char *, char *, (const char *, int), +@@ -945,7 +943,6 @@ _GL_CXXALIASWARN (strpbrk); + Even in this simple case, it does not work with multibyte strings if the + locale encoding is GB18030 and one of the characters to be searched is a + digit. */ +-# undef strpbrk + _GL_WARN_ON_USE_CXX (strpbrk, + const char *, char *, (const char *, const char *), + "strpbrk cannot work correctly on character strings " +@@ -975,7 +972,6 @@ _GL_WARN_ON_USE (strspn, "strspn cannot work correctly on character strings " + #if defined GNULIB_POSIXCHECK + /* strrchr() does not work with multibyte strings if the locale encoding is + GB18030 and the character to be searched is a digit. */ +-# undef strrchr + /* Assume strrchr is always declared. */ + _GL_WARN_ON_USE_CXX (strrchr, + const char *, char *, (const char *, int), +diff --git a/libtextstyle/lib/wchar.in.h b/libtextstyle/lib/wchar.in.h +index a6c52eb..b4de385 100644 +--- a/libtextstyle/lib/wchar.in.h ++++ b/libtextstyle/lib/wchar.in.h +@@ -316,7 +316,7 @@ _GL_EXTERN_C int wcsncmp (const wchar_t *__s1, const wchar_t *__s2, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (2, 3); + # ifndef __cplusplus +-_GL_EXTERN_C wchar_t *wmemchr (const wchar_t *__s, wchar_t __wc, size_t __n) ++_GL_EXTERN_C wchar_t *(wmemchr) (const wchar_t *__s, wchar_t __wc, size_t __n) + _GL_ATTRIBUTE_NONNULL_IF_NONZERO (1, 3); + # endif + _GL_EXTERN_C wchar_t *wmemset (wchar_t *__s, wchar_t __wc, size_t __n) diff --git a/meta/recipes-core/gettext/gettext_0.26.bb b/meta/recipes-core/gettext/gettext_0.26.bb index b99b301af48..bb730154497 100644 --- a/meta/recipes-core/gettext/gettext_0.26.bb +++ b/meta/recipes-core/gettext/gettext_0.26.bb @@ -26,6 +26,7 @@ SRC_URI += " \ file://serial-tests-config.patch \ file://0001-tests-autopoint-3-unset-MAKEFLAGS.patch \ file://0001-init-env.in-do-not-add-C-CXX-parameters.patch \ + file://0001-Port-to-C23-qualifier-generic-fns-like-strchr.patch \ " SRC_URI:append:libc-musl = " file://0001-Ignore-failing-tests-needing-BIG5-encoding-on-musl.patch" From patchwork Thu Apr 16 06:47:24 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86233 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DEB4FF88085 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7583.1776322115041611211 for ; Wed, 15 Apr 2026 23:48:35 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=SwAN6eLE; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43d75312379so180480f8f.1 for ; Wed, 15 Apr 2026 23:48:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322113; x=1776926913; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=aTSTwpC5bDG19T7VWxJSvKNmzJSczFr0PvMMp4dsYB4=; b=SwAN6eLEWGGeMmSR2fDRpwlMo9smWYorE5LVsOlAC8HhRabqYXmDh+f+cY/Ud2ApPU A8PS0WzxdoR9rJz/fdWrhn4Jl8vi1v2/2h/iaNdcrEnyTtA57iZ1jfPCjixO9+fapsyh hMqQUaDLJ8MAhQ7fCHW+NbnAsLb5CamuFXSQU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322113; x=1776926913; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=aTSTwpC5bDG19T7VWxJSvKNmzJSczFr0PvMMp4dsYB4=; b=c7AXrLGCd8uwORB0reXJb09HYZjjkuZl/gcfzW0GpYFpPyO+HfnhB75KBAkNuveamZ vLRhnDn/bfgDj13vmve2HNDbKGgx8oX0xQcAJSsM6HEra353HBbt5MFai1iguElQe8/C EhRGDwGjtIgttCtvWj7esMpYY12qmPG6qduHk1hvSRWOrlTL33ytCq22SS23340R+JwB YNVYgD7FLcLvIZ0onJNcWOK6AgSYAlUv6ttO6rKWk9SpNk1CWet/ig5+lD/nAJIiu5N0 x2IJVU8HI8jlUbDsiMahM1IizQ63pPrntt56qSEs6qwXNVGgOYMqk1tNk3+7Tnh4BzCc dVHw== X-Gm-Message-State: AOJu0Yymx30e43YY0Yv4pih9WAKlc3ZwKLOe5r7h7GBg9Vn0fci/XN8M NJ9tGCzxoD6RU0q+0/Ck/20bcmyNGfy6y+AZRwe9gVzmNP9hbjPLKOLeh0JEKSetVoIzhwf2ed8 udyN1/uQwv0TC X-Gm-Gg: AeBDievrKCGV+ODh4mHnDL4CuKA+mO4b2bcBqrfxypS/sXx4bO+Dl+KUK2gTTYtec2U 9qjyFbXGjDmgEQVYVXEjasOvRLuCLRiNJI4yVto7cJ8TCTY5d51T01lDL7ukisyCmv9c7MXQc7D JZxurYB5QzPbfm4kONTymApnWfKaSh7n64q68BpDDMH2MY/2VBZL6fe2OqaawEr6XNKPfumr0fA 1KoEPixPo8d6O+Wgeg0MVEqouA3suVR7/UE/6kRpKzoKrfTiW94w0kWV3okKHrd+I5D8bNBWnG5 CGoMAGEDI5B/uw0S8hP3q27Ia464ronDPquc4iwB67lEWok2jR+8xZkW66SC9zjn4bFGTpFPzmZ rTBYRYxpinz9kxj0mi89Y0sh4d3/4qNfOqIoq7M4YCp/icaR1nrZ/0qrW6EeoYY+lewWpyC/hii h+H7LyDZxc4XNweyidpqGjQPaRegXNU4anLmQL962wxetRreliowq8Yo3LriHg8ioR/u6uJfade QKAYzyOlbrasOuK3/rg2cb9mF7tEcYynvBmrQ== X-Received: by 2002:a05:6000:1244:b0:43c:f257:c706 with SMTP id ffacd0b85a97d-43fdbb672e3mr547515f8f.23.1776322113148; Wed, 15 Apr 2026 23:48:33 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:32 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 23/47] util-linux: backport fix to build with glibc-2.43 on host Date: Thu, 16 Apr 2026 08:47:24 +0200 Message-ID: <5fda90b79d6b0e4fd948927cb66d3bfad0e34b09.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235365 From: Martin Jansa Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-core/util-linux/util-linux.inc | 1 + ...x-bsearch-macro-usage-with-glibc-C23.patch | 40 +++++++++++++++++++ 2 files changed, 41 insertions(+) create mode 100644 meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch diff --git a/meta/recipes-core/util-linux/util-linux.inc b/meta/recipes-core/util-linux/util-linux.inc index 3135bbb7c64..3bcf681f243 100644 --- a/meta/recipes-core/util-linux/util-linux.inc +++ b/meta/recipes-core/util-linux/util-linux.inc @@ -21,6 +21,7 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/util-linux/v${MAJOR_VERSION}/util-lin file://0001-ts-kill-decode-use-RTMIN-from-kill-L-instead-of-hard.patch \ file://0001-tests-helpers-test_sigstate.c-explicitly-reset-SIGIN.patch \ file://0001-include-mount-api-utils-avoid-using-sys-mount.h.patch \ + file://0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch \ file://CVE-2025-14104-01.patch \ file://CVE-2025-14104-02.patch \ " diff --git a/meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch b/meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch new file mode 100644 index 00000000000..6194594f7fc --- /dev/null +++ b/meta/recipes-core/util-linux/util-linux/0001-lsfd-fix-bsearch-macro-usage-with-glibc-C23.patch @@ -0,0 +1,40 @@ +From 710a6989e0fc6dfc9290e2639022d1dbf429557f Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Cristian=20Rodr=C3=ADguez?= +Date: Sat, 22 Nov 2025 10:41:08 -0300 +Subject: [PATCH] lsfd: fix bsearch macro usage with glibc C23 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +C23 requires bsearch to be a const preserving macro, build now fails +with + +../lsfd-cmd/lsfd.c:1879:75: error: macro ‘bsearch’ passed 6 arguments, but takes just 5 + 1879 | nfds, sizeof(struct pollfd), pollfdcmp)) + | ^ +In file included from ../include/c.h:17, + from ../lsfd-cmd/lsfd.c:48: +/usr/include/stdlib.h:987:10: note: macro ‘bsearch’ defined here + 987 | # define bsearch(KEY, BASE, NMEMB, SIZE, COMPAR) \ + + add parenthesis around expression to fix it. + +Upstream-Status: Backport [2.42 https://github.com/util-linux/util-linux/commit/711bda1441561bfd2eb6d45fe0bc789535c1f1a8] +Signed-off-by: Martin Jansa +--- + lsfd-cmd/lsfd.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/lsfd-cmd/lsfd.c b/lsfd-cmd/lsfd.c +index 75cd1de..9aae240 100644 +--- a/lsfd-cmd/lsfd.c ++++ b/lsfd-cmd/lsfd.c +@@ -1836,7 +1836,7 @@ static void mark_poll_fds_as_multiplexed(char *buf, + struct file *file = list_entry(f, struct file, files); + if (is_opened_file(file) && !file->multiplexed) { + int fd = file->association; +- if (bsearch(&(struct pollfd){.fd = fd,}, local.iov_base, ++ if (bsearch((&(struct pollfd){.fd = fd,}), local.iov_base, + nfds, sizeof(struct pollfd), pollfdcmp)) + file->multiplexed = 1; + } From patchwork Thu Apr 16 06:47:25 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86236 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CCF49F88081 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7723.1776322116083804015 for ; Wed, 15 Apr 2026 23:48:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=B4DCvosr; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488a29e6110so80099385e9.3 for ; Wed, 15 Apr 2026 23:48:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322114; x=1776926914; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xd1Oh51XRJtN4hlM/3Q0YJ5TBwhGd63HGd4UxeJdqMI=; b=B4DCvosrmQI4u5oSJ6PFGFI9mtL2b8QYL1PbDFHzTu2l27WBmf6D/CTWdxHCzMhaRy pa3zRto9zkE9ib6x2yhba4oWwl+EmCrJfFISqIFt37yOvkJairkPlKhb7tKnNIlK+/Lz PsALggrZ+nHgRkqkkxtYhJ3+f/rWIX6aDgS9A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322114; x=1776926914; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=xd1Oh51XRJtN4hlM/3Q0YJ5TBwhGd63HGd4UxeJdqMI=; b=Ene7mak7pY9OJEP5RnJW5+xxiTlPoRWHX634fVrNgr1TWVhmhJSEVOKKGBRUm0Adp3 y04oeDnP6TyctiCccv13zq9rKFNYp+QWFQJRR/DKtqUoZw8pYFkVz2SN20lSeyva6S0q pg1FFcKTW6yZfNUqRQcnTBeY2Utqc2J/79NMMQaYMzYpLRHxMjmGX3PPVvfkxqg6rox3 mTdZgo3wZvw4Dkk/7wO8MH8ipDTFGi1pUt5Qz9JIN65jHPnSurXWCdAW29bGKe7hm8IK tu4QX1dHqwKA9xaWSB7jWp1H//wmSZm+OaWisB0l+tT3E2V93kLW6kR8ONziwwDqWOvp /IhA== X-Gm-Message-State: AOJu0YwVWhFlyYeNXqqANwipr1FScv7i9NSY4VxuS0xynKFORwPKXDPJ YSGBHY4sAeN4JkAos7P4wZuuOorH2PqMJZRBGGiKDzG6SH3ku1jBrbDKF3J22vI7jh+L1j4XwQf IgFSOVjRF6GtA X-Gm-Gg: AeBDiesSHzkCKjEpX0kWvLHuHCGvkHUD5brDX4s6MTHs15VI53Ynsa3wduV7XTn6AlA BrlMv9lqpPGH94elzu5lsLcgOuk/BSlm5jwOsJv4L91KgBU2Gn6qqmt2BuJaPJpH6KGsQMsNH05 wjNguxRJIyKjZvyUbHcrolgGd2j41ViBFH1Ijmb4AxNaBIKia5qcxwEC21T3ej2finayAQ7kE4V hfxLfBV9KE4NbfIfUaOZel46KTsJ7Pq1FIuKyhEgirWoPIF3LTT/IY+idukFmK1IiJtXDX312d4 tAbbJs3RXQiHVnkYLA2B0rCsUaJQV0tC5e0612ixkUMVxKxo7Hqs+RnGt7oG7WCuxOFmyl3nUKf nL3+ga0jRg1AuqifjqQ/Zgu0R8whV8NA572//oDVzj2Qy/HOssgbatLkU+8qO6Zw9JJT23Et2Yk solWizTq9PQ6fQ+LLN5fvvomeLhJKZxiV0xP4Z2RTtdHjE8v9fE2y2FzOulCA4HooyPhVCDB1Pu 9Q4Z5JUTKSiDL2P32MprhMecqqA90JPdqNEDw== X-Received: by 2002:a05:600c:8585:b0:488:ba19:da25 with SMTP id 5b1f17b1804b1-488d6822a0bmr243235035e9.12.1776322114129; Wed, 15 Apr 2026 23:48:34 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:33 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 24/47] systemd: backport fix to build with glibc-2.43 on host Date: Thu, 16 Apr 2026 08:47:25 +0200 Message-ID: <166f2b4685678af745f346c6f73aab6f12e84149.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235366 From: Martin Jansa fixes systemd-systemctl-native on hosts with glibc-2.43: In file included from ../sources/systemd-systemctl-257.9/src/basic/errno-list.c:13: src/basic/errno-to-name.h:71:23: error: initialized field overwritten [-Werror=override-init] 71 | [EFSBADCRC] = "EFSBADCRC", | ^~~~~~~~~~~ src/basic/errno-to-name.h:71:23: note: (near initialization for ?errno_names[74]?) src/basic/errno-to-name.h:114:26: error: initialized field overwritten [-Werror=override-init] 114 | [EFSCORRUPTED] = "EFSCORRUPTED", | ^~~~~~~~~~~~~~ src/basic/errno-to-name.h:114:26: note: (near initialization for ?errno_names[117]?) Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-core/systemd/systemd.inc | 4 ++- ...ilter-out-EFSBADCRC-and-EFSCORRUPTED.patch | 34 +++++++++++++++++++ 2 files changed, 37 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch diff --git a/meta/recipes-core/systemd/systemd.inc b/meta/recipes-core/systemd/systemd.inc index 761660f2c84..f41acc029d1 100644 --- a/meta/recipes-core/systemd/systemd.inc +++ b/meta/recipes-core/systemd/systemd.inc @@ -17,6 +17,8 @@ LIC_FILES_CHKSUM = "file://LICENSE.GPL2;md5=751419260aa954499f7abaabaa882bbe \ SRCREV = "5e38d199a623563698ab4a69acbbe3afa9135198" SRCBRANCH = "v257-stable" -SRC_URI = "git://github.com/systemd/systemd.git;protocol=https;branch=${SRCBRANCH};tag=v${PV}" +SRC_URI = "git://github.com/systemd/systemd.git;protocol=https;branch=${SRCBRANCH};tag=v${PV} \ + file://0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch \ +" CVE_PRODUCT = "systemd" diff --git a/meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch b/meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch new file mode 100644 index 00000000000..5673175cb13 --- /dev/null +++ b/meta/recipes-core/systemd/systemd/0001-errno-list-filter-out-EFSBADCRC-and-EFSCORRUPTED.patch @@ -0,0 +1,34 @@ +From fb146f6d2c5118410fd19907651fd8f7310bf69e Mon Sep 17 00:00:00 2001 +From: Yu Watanabe +Date: Tue, 24 Feb 2026 20:19:45 +0900 +Subject: [PATCH] errno-list: filter out EFSBADCRC and EFSCORRUPTED + +These are introduced in kernel v7.0. + +Upstream-Status: Backport [https://github.com/systemd/systemd/commit/3cfb16998808a6ec8012a6120d0a82f0e1a0c8bb] +Signed-off-by: Martin Jansa +--- + src/basic/generate-errno-list.sh | 10 +++++++--- + 1 file changed, 7 insertions(+), 3 deletions(-) + +diff --git a/src/basic/generate-errno-list.sh b/src/basic/generate-errno-list.sh +index f756b2e020..491fa1b6e3 100755 +--- a/src/basic/generate-errno-list.sh ++++ b/src/basic/generate-errno-list.sh +@@ -3,9 +3,13 @@ + set -eu + set -o pipefail + +-# In kernel's arch/parisc/include/uapi/asm/errno.h, ECANCELLED and EREFUSED are defined as aliases of +-# ECANCELED and ECONNREFUSED, respectively. Let's drop them. ++# In kernel's arch/parisc/include/uapi/asm/errno.h, The following aliases are defined: ++# ECANCELLED → ECANCELED ++# EREFUSED → ECONNREFUSED ++# EFSBADCRC → EBADMSG ++# EFSCORRUPTED → EUCLEAN ++# Let's drop them. + + ${1:?} -dM -include errno.h - X-Patchwork-Id: 86229 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 866EEF88073 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7724.1776322116563941500 for ; Wed, 15 Apr 2026 23:48:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=FQ1KUH5U; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so116627685e9.2 for ; Wed, 15 Apr 2026 23:48:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322115; x=1776926915; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=KJb1Dlh4BL8yr9dAzwUZYcUbujXbwXURbUU05zFLT60=; b=FQ1KUH5UUiLBWUXZzwd8DFrzki7FDdLse/YThiE4poCwnIzgzTo+n5BMbcq/bHrkgw 3fJ/PlkcVDOKFvMZ5lt68spEiviidxQg4AxiWC4FONUp3pdKEYeX8dtj4U9RCu9yfxbm s5MFt9Y9uL3Kesb3NINRYnkJSa/B7hrKnEgLY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322115; x=1776926915; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=KJb1Dlh4BL8yr9dAzwUZYcUbujXbwXURbUU05zFLT60=; b=sNudxa7eJRYT8mWCyeVUmNqtOrq6Yt7vnFARBk4AXq6b6YnZ1feQQnqMOt9YHFYbQ2 5WyWby79Zk96K57AJZKYNz0EYUABdo0/GTPZbtZYehiIHOqyNu8PerayiEeX8lzJpj9P HnDF09swoFnOFUC1hz+TS1O0Wem0uJBgvPyiEvq9epC0+AmgR9xwC1bxBnniJgykllBS 8hEY7Ulh7L4kaAIZCJEcA3kOx1t2U9e6Ci+vvJzB5SZ2pD9M4X+S5Hwqo/IhAK/RKAuL xVRfN/gJt7d49vKVPNbClP9i497GVs6w3IEYyZCTyQDbJ29tLmacVHUge2AVC5wkyyRW QS5g== X-Gm-Message-State: AOJu0YzqCx6TEMphzVwPLNsvnmsv7hFUDlLQ1sM6ucbYklJjtC6jP+85 5JjN72Z0fErzMR/T9AHVRrdnY3spml6h1Gt2nb/m9YKlCykqEDVn/qmtFOqsnFrin0owwogpXF9 iCY1t+4pM54iz X-Gm-Gg: AeBDietC75qmqZguiyBJkn0S0lwPJtWUzXc88aoGjD8MPuWeepiwZfZeTE9Rb5mm0Q4 1LHpjP0iEakoWEM53jwry+ke3D/8CHAvM5+TvnXBxWBSP0RR7fAKIjPbxX5qrSaQkIA63xbFaxa avAFDkKa7hTzStzS/4bUWfTpNYe+VwQB2PNYVGOjsSVEOVPaXNRCE4DXpC6SMTmjhbpS24Y5mML 6z9gULVnhU8PX8HbUNUyKdXbX7IDWTXDwDjNiE62J7mDVqpYl7Luoa24Fwq3cxCi58RY9mJauql 8QeWA9XTx7EE1ygRc57ZtHtfJ8Y9T71Vorsp+eHbi8PugYfpSTw7GKeWidZMff1zrzFCj03cv9r 4TNJvOBWVdyvYjg56xdkwaOrHmCxN0lNrEUr9LAqzl8XCnVSL4oNGumlYT/u0dlJ+jZH0X2JS5L fOjfZtQ5/pgTClFtfSypuTkAHT5goV7bP1ICFMsTs26qvF7WXuHFcf4VawESw39oqkjr+m7kmP5 4D7DqxbcyljcX8u/QukdRR6Vq7FFzUshTv2rg== X-Received: by 2002:a05:600c:4e45:b0:488:8c89:cfaa with SMTP id 5b1f17b1804b1-488d67bf6e0mr361225695e9.3.1776322114683; Wed, 15 Apr 2026 23:48:34 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:34 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 25/47] virglrenderer: Fix build with glibc 2.43+ Date: Thu, 16 Apr 2026 08:47:26 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235367 From: Khem Raj Signed-off-by: Khem Raj Signed-off-by: Mathieu Dubois-Briand (cherry picked from commit 8e85dc6b7f5f7668a610b5fd3754c716f0af65b0) [YC: Fixed patch format and Submitted->Backport] Signed-off-by: Yoann Congal --- ...once_flag-ONCE_FLAG_INIT-when-presen.patch | 55 +++++++++++++++++++ .../virglrenderer/virglrenderer_1.1.1.bb | 1 + 2 files changed, 56 insertions(+) create mode 100644 meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch new file mode 100644 index 00000000000..2fa7245371d --- /dev/null +++ b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch @@ -0,0 +1,55 @@ +From 179e744f7577d98df7c79d7324c22acfb32a0154 Mon Sep 17 00:00:00 2001 +From: Dave Airlie +Date: Fri, 7 Nov 2025 13:14:56 +1000 +Subject: [PATCH] c11/threads: fix build on c23 + +C23/glibc is now including once_init in stdlib.h + +https://patchwork.sourceware.org/project/glibc/patch/78061085-f04a-0c45-107b-5a8a15521083@redhat.com/#213088 + +Just fix up our use of it. + +Upstream-Status: Backport [https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/3f0f775edb2df5ea54c37863286ad565ccddb276] +Signed-off-by: Khem Raj +--- + src/mesa/compat/c11/impl/threads_posix.c | 3 ++- + 2 files changed, 4 insertions(+), 1 deletion(-) + +--- a/src/mesa/compat/c11/threads_posix.h ++++ b/src/mesa/compat/c11/threads_posix.h +@@ -51,7 +51,9 @@ Configuration macro: + #include + + /*---------------------------- macros ----------------------------*/ ++#ifndef __once_flag_defined + #define ONCE_FLAG_INIT PTHREAD_ONCE_INIT ++#endif + #ifdef INIT_ONCE_STATIC_INIT + #define TSS_DTOR_ITERATIONS PTHREAD_DESTRUCTOR_ITERATIONS + #else +@@ -66,8 +68,9 @@ typedef pthread_cond_t cnd_t; + typedef pthread_t thrd_t; + typedef pthread_key_t tss_t; + typedef pthread_mutex_t mtx_t; ++#ifndef __once_flag_defined + typedef pthread_once_t once_flag; +- ++#endif + + /* + Implementation limits: +@@ -90,12 +93,13 @@ impl_thrd_routine(void *p) + + /*--------------- 7.25.2 Initialization functions ---------------*/ + // 7.25.2.1 ++#ifndef __once_flag_defined + static inline void + call_once(once_flag *flag, void (*func)(void)) + { + pthread_once(flag, func); + } +- ++#endif + + /*------------- 7.25.3 Condition variable functions -------------*/ + // 7.25.3.1 diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb b/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb index 89dd25de70e..be4385ada61 100644 --- a/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb +++ b/meta/recipes-graphics/virglrenderer/virglrenderer_1.1.1.bb @@ -12,6 +12,7 @@ DEPENDS = "libdrm libepoxy python3-pyyaml-native virtual/egl virtual/libgbm" SRCREV = "0f1f43929724a6a414c01a29bc51feccb445c2f0" SRC_URI = "git://gitlab.freedesktop.org/virgl/virglrenderer.git;branch=main;protocol=https;tag=${PV} \ file://0001-meson.build-use-python3-directly-for-python.patch \ + file://0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch \ " inherit meson pkgconfig features_check From patchwork Thu Apr 16 06:47:27 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86231 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A7BAAF8807F for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f47.google.com (mail-wr1-f47.google.com [209.85.221.47]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7725.1776322117168287737 for ; Wed, 15 Apr 2026 23:48:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wdZgxmPD; spf=pass (domain: smile.fr, ip: 209.85.221.47, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f47.google.com with SMTP id ffacd0b85a97d-43d7213b6ebso2682058f8f.3 for ; Wed, 15 Apr 2026 23:48:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322115; x=1776926915; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bcZ/HfQtRKtWZJsk4vppdO7Mc19rvtmmKW48HwDGObU=; b=wdZgxmPDNK4fDfN3HhbWvxi53xdjmrAtNrGaHYg3qDVrETGliqsRgFuVdfnnKBgF7k Y6UTIbTuuamtI7VZxlBpMgrC+oaWXdKFVxotr/S7UTIicmoEkhv3pBvIeC+t3ARDt99D FVYi0pWoEF0XpGNzE4Ichl42bRRZfVzrszmxw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322115; x=1776926915; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=bcZ/HfQtRKtWZJsk4vppdO7Mc19rvtmmKW48HwDGObU=; b=PXL9/0PleFZYGgP6oQkC3Zz9xf0ThAKVxtFwuPh8Xr15iLef0YjvzSaU3kH4xkWLig 53JPgKrxORDzE1kT2R9aa3zOHfaSd/HsTO9se1iFTDedoDHfkOO/I+nveKUhndTMjkN/ EDtjzBSCmhBmKCNlj8hdQfJowyTbgpCGR2EFzFLJfe1biOaKePfXtR1GtGk3l3dbwaOd +w/0EDaPkFQssn/BHqsec2SMYJH4gqFNhs1tXmSWAijXPfK4j3LeZsV3i+A2JVXjVmCI YmJX9XXCALz9+BT7oixCvv4Lun1KsMr1zGeDPSTZ8LfLSy1jP2vSka2Sa3s5ZnohONek 6+FA== X-Gm-Message-State: AOJu0YxPrMvNCf3mZEDr0Du2BEXtekoOjeuMcTtWdz4kSSj+NMY0VkI+ OVCzBDNqbKpzlqyec9jupsdOkGMeb6wPHmMwQrylOOOz6iG0CD8AQ1LKWvjngK0vognOhpbLcPJ PN3OBdz69KA== X-Gm-Gg: AeBDietfjN1OGrdY3RMdpNaBRgAh/xhgaqCZNbn+Tiktl6fmcpgDYSp+jUiWSV91ZZ+ JEttKKnkpH4sbG7yxwBLRcJkfcldK1fli8MbnmBMpqGI4xvA/69IaF7xatMaHzUHBiDas6Deiug 2ZKjJO3038RXYhFtC/GPFacr+oUN59p7IrcIP+Lwf/HyqEVb+RUj2gPWln/EOV51ssXYpWmsBpz Mun9VqRCKnPXxIrjfyj/sesUFKk76oHV3kVpFlm1hCDbCAzwQKGOFDsN+zcqG4Ga7Be5LNGprRX 2MByWNsY2jACwxC7kb7hVNX85MJeLLOFiizYnsJWrgdYZ29PqgQUqbXZqOEKF8kA4LGoaxz7bAc 10h4PDqv2scRwmZbM2Ep7rqIDZ/XTNPtALJKWuXTdZnLcx8MhRfBKPMwtCzhT1g8kxY7Lt/fqdz eEQRr5QQYKFJsWS69lOjvVQ4IoGiQNfIpReWG5t/XlS+ePf11bp6Wo9Y1+re72jNk3DAw3jfYWf oeMHcXRTnCScYr2DoSySQtf18Q469bxSt1Ygw== X-Received: by 2002:a05:6000:2f88:b0:43e:a69b:d810 with SMTP id ffacd0b85a97d-43ea69bd972mr14385354f8f.38.1776322115151; Wed, 15 Apr 2026 23:48:35 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:34 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 26/47] libxcrypt: avoid discarded-qualifiers build failure with glibc 2.43 Date: Thu, 16 Apr 2026 08:47:27 +0200 Message-ID: <84c2eb57c30101cc5f6acd0bd62b6af5d7e22e0f.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235368 From: Hemanth Kumar M D With the glibc 2.43 upgrade, building nativesdk-libxcrypt triggers a -Wdiscarded-qualifiers warning in crypt-gost-yescrypt.c and crypt-sm3-yescrypt.c which becomes a build failure due to -Werror. Signed-off-by: Hemanth Kumar M D Signed-off-by: Richard Purdie (cherry picked from commit 8340d4be03646f0b4b599f768ddc88f502f93615) Signed-off-by: Yoann Congal --- meta/recipes-core/libxcrypt/libxcrypt.inc | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index da515d19270..1292f4288bc 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -19,6 +19,7 @@ PROVIDES = "virtual/crypt" BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}" TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error" CPPFLAGS:append:class-nativesdk = " -Wno-error" +CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers" API = "--disable-obsolete-api" EXTRA_OECONF += "${API}" From patchwork Thu Apr 16 06:47:28 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86228 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 92F9AF88078 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7584.1776322117780781017 for ; Wed, 15 Apr 2026 23:48:38 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=00a4kNBI; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488b0046078so73607735e9.1 for ; Wed, 15 Apr 2026 23:48:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322116; x=1776926916; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WXzXM3DbToyzC5TpDNpfUuaOMlAQtMvX2S9gnLe3IMg=; b=00a4kNBITFwpvuGWhBo0sQONuDi0GUMqZn2jvA4g72n6V7Yw6T8W+wHc4+EV7Giu1+ kfiHmuLF1uceYrySjcWUhpcBWUdECz6RIluOhnXepJ/nvr30E8LN0AOfYUYjqfoMOC1L kD8UzFqpM7Xs7vCjq7hXQWtkggAXiOd2xrYqM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322116; x=1776926916; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WXzXM3DbToyzC5TpDNpfUuaOMlAQtMvX2S9gnLe3IMg=; b=P0CVAuoHtKnejXcVtwaZSwyQiobZm9Ymedq2iwOXVTkvjg9KO9Gzz9osrFTozonEw7 rSlY7gF54s7rvM/bAZ3XyerNzcFJmZhJQRFPX3qEFMzYCVugQ4ZcNysD218psFK14wzD 2Aby7TslyPvRc12DJHAgvXrNtSuUDx7mu2mwyhOoOTqh4zBfBwstzNFX/dsz+C+pZNBH 1p4Ws1MscWIEfLATtsh93Ppo46f/z6QWDW9JVagJ6r5ddSbSSZoaoBVTs2x5VKr5nj3C HLfVAMl/yU1Cxv9wwAiORUHz08UBbjIokx135SFpapIvRFGO/2SF6TdqDVw6dyas5o0h GVfQ== X-Gm-Message-State: AOJu0YxE81L9HhtsIvQAcXt6V5OR6bE9IcjbqO8d7dhMJ5oPDg//mJkR GnChakD4OWE/vs/FUVk/lCELpVVYJJBqtds6cqxwmV7TmFi0oQXkq0Z1SaOE2dnjz0D/s9CrRke EIHAxnmb359CB X-Gm-Gg: AeBDietrCfl/Xw+vSGcB8WLwDqZMqNxUJ88n8w6qGTg+laD3+1g1rAPxowHcSIODOeI t4Fl9ZreXx0bn2xG6kqVwWbUE0WL1rMEyfmMIzcXPEm/XWydBZqucAbFfaqyPw0uJXZ73UBwKkE bPL/ArcBuSo95XFP4KOiPxmqDq4P/AwfjMS9hggx5poHTgfjA1NPY5HIEtTl4Q4Dgc5AjDHwwG4 JVElW6NRrcBbYT+IfYimWuTHGaA03yG/FB3l4FhV8Nkpa8gHoDMmN+LBWaNpnzqhBrMcU1bUzSy Jz51MGkCAniFhpvjwC0sSw3KVWB/NhE9xmKye3dHMScP4tFPJJaDdo+2tbH/PKtFmf3x+m+IX03 tdJ4MsTQuqaJ4jHRdPQ5lKsQvy6vnX8WAim6fZG8RqSf1490/CkyuS2XjDk+rWQUYB9MUrcFhbh HfNbFoDtMBQycy6PfxWhG7Jbsg0apoAKjskNiM/3FxwTVqtItl7h+VJmtA7y/0y6AxM10h7b6Fo 73h6HphvfXbbDIbAEg3sNtfQGhXpCBdZ/PK4w== X-Received: by 2002:a05:600c:8709:b0:485:4135:5c92 with SMTP id 5b1f17b1804b1-488d66580e3mr334531945e9.0.1776322115755; Wed, 15 Apr 2026 23:48:35 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:35 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 27/47] libxcrypt: Fix build wrt C23 support Date: Thu, 16 Apr 2026 08:47:28 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235369 From: Khem Raj latest glibc has better C23 support and exposes this problem Fixes following errors seen in nativesdk-libxcrypt | ../sources/libxcrypt-4.5.2/lib/crypt-sm3-yescrypt.c:139:9: error: initializing 'char *' with an expression of type 'const char *' discards qualifiers [-Werror,-Wincompatible-pointer-types-discards-qualifiers] | 139 | char *hptr = strchr ((const char *) intbuf->retval + 3, '$'); | | ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 6 errors generated. Compared to wrynose remove lib/crypt-sm3-yescrypt.c change, because the file doesn't exist in the version used in whinlatter, it was failing only in lib/crypt-gost-yescrypt.c Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit a666b8e71ecda97db58c90d5af137671f9823f38) [YC: fixed patch format] Signed-off-by: Yoann Congal --- ...24d6e87aeae631bc0a7bb1ba983cf8def4de.patch | 29 +++++++++++++++++++ meta/recipes-core/libxcrypt/libxcrypt.inc | 1 + 2 files changed, 30 insertions(+) create mode 100644 meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch diff --git a/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch new file mode 100644 index 00000000000..75749c054a2 --- /dev/null +++ b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch @@ -0,0 +1,29 @@ +From 174c24d6e87aeae631bc0a7bb1ba983cf8def4de Mon Sep 17 00:00:00 2001 +From: Stanislav Zidek +Date: Wed, 10 Dec 2025 14:03:54 +0100 +Subject: [PATCH] fix -Werror=discarded-qualifiers + +On Fedora rawhide (to be Fedora 44), gcc became more strict +wrt. const-ness. + +Upstream-Status: Backport [https://github.com/besser82/libxcrypt/pull/220 without lib/crypt-sm3-yescrypt.c] +Signed-off-by: Khem Raj + +--- + lib/crypt-gost-yescrypt.c | 2 +- + lib/crypt-sm3-yescrypt.c | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/lib/crypt-gost-yescrypt.c b/lib/crypt-gost-yescrypt.c +index 190ae94b..e9dc7e80 100644 +--- a/lib/crypt-gost-yescrypt.c ++++ b/lib/crypt-gost-yescrypt.c +@@ -131,7 +131,7 @@ crypt_gost_yescrypt_rn (const char *phrase, size_t phr_size, + intbuf->outbuf[1] = 'g'; + + /* extract yescrypt output from "$y$param$salt$output" */ +- char *hptr = strchr ((const char *) intbuf->retval + 3, '$'); ++ char *hptr = strchr ((char *) intbuf->retval + 3, '$'); + if (!hptr) + { + errno = EINVAL; diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index 1292f4288bc..d84cbc9db39 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -10,6 +10,7 @@ LIC_FILES_CHKSUM = "file://LICENSING;md5=c0a30e2b1502c55a7f37e412cd6c6a4b \ inherit autotools pkgconfig SRC_URI = "git://github.com/besser82/libxcrypt.git;branch=${SRCBRANCH};protocol=https \ + file://174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch \ " SRCREV = "55ea777e8d567e5e86ffac917c28815ac54cc341" SRCBRANCH ?= "master" From patchwork Thu Apr 16 06:47:29 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86232 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0BF54F88089 for ; Thu, 16 Apr 2026 06:48:43 +0000 (UTC) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com [209.85.221.52]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7726.1776322118319205369 for ; Wed, 15 Apr 2026 23:48:38 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Y0RFOjoH; spf=pass (domain: smile.fr, ip: 209.85.221.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f52.google.com with SMTP id ffacd0b85a97d-43d73352cf2so3798801f8f.1 for ; Wed, 15 Apr 2026 23:48:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322116; x=1776926916; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MxhVmaE7zOkp6+PRpkOk7YIy8FhadmSy8TPi6WlO+KI=; b=Y0RFOjoHn+zOSMfe6Ms/K/bfh1VumFLj25+UxlTL3qe36CwsjalCruKVmnoV17no4o iys2mfcP+XgtiNlRlS4EFJ/coIl6cdHkZqx9PyezUEs3pqpWDslbf+T67x4czYphxv1Z 1kuzf+VU3s+o4vT9xX3vpfvt8hmBiuIE4YSGc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322116; x=1776926916; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MxhVmaE7zOkp6+PRpkOk7YIy8FhadmSy8TPi6WlO+KI=; b=hUXgsxS3LuYx5SMJZ59EHEzx9pgAmecqcVcJ1m8rIbgR4GgO0Nvm8YNWmzf9DiRrZt 2cP4JQ1iKdewmhvdmlK31qM8Qy/S62efGPP7/AUd5qcjLfEPnbY8dFnN634v0TWN5cwM K3+mZDaU5pay3YHzBsH4PVu4T54Mjy0pa9kDzVmRuN/8X7JAvc/fEDPB1Qw4+732hgXb obOkoRkPRRWP1/V666+UO+EV1pUbkSZvBRQveFgCoxkHj4C5+m8wBEJuMm29uQm/xt27 Hpvu5EDCDxdGurYjEC4fujgy9mefakr+u45VuDdcYtofcd40inx8ifqIORj8XrkddReP siWQ== X-Gm-Message-State: AOJu0YzSTZAam7N4338l5EjjvcYgT5syDO91LFfEansf7jnm+zyH6voI 7BEEan3Cl/V9JvV2/9Itt79fyq4OXcICEYn0mZY25Qp0c33lL5qQWkF03G1kVhyNdwqKXY1a0N1 E1KDat+cGug== X-Gm-Gg: AeBDiesV7r130XM/UijohL++0muNUeKcRICsNF9U8z2my/BaN+N+C0TCUIs3SV6zfNC X3KDLQimwRinFcQlM00PISIEUD0Mv7jyK2/cw6kMExFXNbcG1g0OH05nVo7MOh09DwFDmepGgXC hjYAxUsFHTB9pTbcCR4Z/0YL8yUAqzByADJ4YSFM38Sna+LSa0DGNLWeV37YytqLfPIgUFc0IxI 1JoozjmaYPbc06dCliTP8mONt2bRTd7orbffgiYvWPAJFIlhZxte5fCff7O1wx5FVS+LEyl6xPP 51SQRDMOOTY+XOOTEKRrLGwROGuwMlAtuw4F9P/EBIQHBp9XAz22n7mTuLpA7lshFEpmegZ4X5R wlbISQZq7w5pZFXM8VZBsnu4j8APaQaz+bW3rt5O/EEIPK/1YzfrHNllxkbvIBfiGAhPo0fbK03 XPS7zfJgTk8FwCHwTmShn55BuvDr3nOqJZIDTG3jlTq2yN/OsFmOsQT8apmHzM8nwWFbnqEK0qM FFLLkbr+nGkjvK3Emb/Rs+TbGkdhsxk+RCMFA== X-Received: by 2002:a5d:5d11:0:b0:43d:1c21:ead5 with SMTP id ffacd0b85a97d-43d642a26d9mr37159142f8f.22.1776322116366; Wed, 15 Apr 2026 23:48:36 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:35 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 28/47] libxcrypt: Use configure knob to disable warnings as errors Date: Thu, 16 Apr 2026 08:47:29 +0200 Message-ID: <87b9e62a9e2d984d957ed89c773f349559185c1b.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235370 From: Khem Raj Passing Wno-error via environment flags for target and nativesdk is intended but is not effective due to command line ordering and as a result some patches have been added to disable particular kind of warning as error. Given the scenario, warnings as errors should be disabled for all builds, this makes it portable across hosts and across compilers ( gcc, clang ) and glibc versions. Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit 25f26861ddc8d71af5381d1acc883ad948bddace) Signed-off-by: Yoann Congal --- meta/recipes-core/libxcrypt/libxcrypt.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index d84cbc9db39..25cb7f6178c 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -18,9 +18,9 @@ SRCBRANCH ?= "master" PROVIDES = "virtual/crypt" BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}" -TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error" -CPPFLAGS:append:class-nativesdk = " -Wno-error" -CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers" +TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir}" + +EXTRA_OECONF += "--disable-werror" API = "--disable-obsolete-api" EXTRA_OECONF += "${API}" From patchwork Thu Apr 16 06:47:30 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86226 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7B0ABF88069 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7585.1776322119011047567 for ; Wed, 15 Apr 2026 23:48:39 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0jgiuYRw; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43cf7683a28so5119549f8f.2 for ; Wed, 15 Apr 2026 23:48:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322117; x=1776926917; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=kK7I/Dj6jEptH08CVaYYpmC8ZWnGsKlnT4Wcpctu+Ww=; b=0jgiuYRwGVMy8zrjNlsZLKCsv2otxDgOycuLh35DPvcXMqWOvWYk9sgYPvmngOJgAr 6/Pa0cb2A/0RpO2WtAOjKZBv7BI7GMnBXnBr4jVXCtbToXLj8yfLkvVuXQ4NeltibL6L SZFRrWtml2tgEHne70L0yjACTj16+eHDGpnDY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322117; x=1776926917; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=kK7I/Dj6jEptH08CVaYYpmC8ZWnGsKlnT4Wcpctu+Ww=; b=pWnFfjdDolVcISUp7NKJQLpHd/LYLPY+kg4b6z+PSieR/hFg8HVfQiQiu6RTWXBFAx VqbPkp1XORc4grTrR2B0uoe/KixEXmeWUI54qTY/IKZQqkRBvOMingfNT1KX01wFYzpR vM2vNc/rFmJeLkKMU/oll+MkvSDfLEUZzpYrbjGVhqPMUVIIXeEyyHOvIi98HftswGQg XYK1PCyXAO0TIQBKnvosFPuAlS8rmVurn4GBXwv7154boWrkJmUb1iQzRNtKJn4/9Eej e+cw0MmokNEcpRbwEP4Tc2tEio6shJwsHye5xMMZoenpK9kK61XdJIIEbakaIHRpwB9X 7FWA== X-Gm-Message-State: AOJu0Yyf1SiZck539ydO4xDNJrNZYM9cqVqVkXK6FF814W4HAPKGMDz4 +NOJon3wp3fE0yIQvaxCzfrHx6J5xlFwdsvI5rZv15uvzoiS0oIP+bYBE0d01Qw4H2gtYGQ27tq OjSAJUNQniEYi X-Gm-Gg: AeBDievH2zboYKC2O7VJM35TofJa0Bf3IRgSTv0UqLBWOh0TauiNie3ExHEebK1Q3aX O4xyM7VXsHiUSvzbqA2uFPj3kpGDkLKsT9+1QYVFya8hbOO4UAAHnQ7fcGig4qBma/LqyY3/Mjb YQTieKS5DPOApJysVKlsLLTLH8H/Jv4uX1Dzmmp21hBZleh6KIvlFNhEBzyUkSuvqBRqFUcbjRN pegYesm+RTS8AHFuMkIngo3o831bUa1j5BhwPnMz7SqMav6VYr4imzEH7tTEwRfEKt7ShgAhQRu OxXa6QBSLrflApcACBVQ0PxpuMApWwdrURY8ZtJ708EujWA7KWwkaSCkW60WkplwQc2gPnHPvIF C3dRGZZDjI141FkFUDIfJ6YMkeejXqNRa2vcckQXX0VL97BTzVO4fF769BZ6Gb3AAisU7NFfRES uA+hv09KJ6bAUdNTPqCduxzJ0ZqhFDTPOXhctkKe4cUWQHUl5yalH8v+0qRVrDFe+aA+p1wLqBU Jy7N1C0ViA6wxouo7G1RZ2u++/JyU27dhOjmg== X-Received: by 2002:a05:6000:2211:b0:43d:1deb:a5df with SMTP id ffacd0b85a97d-43d641eb44cmr37394367f8f.0.1776322116955; Wed, 15 Apr 2026 23:48:36 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:36 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 29/47] glibc: stable 2.42 branch updates Date: Thu, 16 Apr 2026 08:47:30 +0200 Message-ID: <6261f1fb32d248ab3b242642674b913039d01758.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235371 From: Hemanth Kumar M D $ git log --oneline 912d89a766847649a3857985a3b5e6065c51bfd4..a56a2943d2ce541102c630142c2eae0fbfc5886b a56a2943d2 tests: fix tst-rseq with Linux 7.0 68099ccc94 elf: parse /proc/self/maps as the last resort to find the gap for tst-link-map-contiguous-ldso 426378547e resolv: Check hostname for validity (CVE-2026-4438) 8e863fb1c9 resolv: Count records correctly (CVE-2026-4437) 1a19d5a507 posix: Run tst-wordexp-reuse-mem test 9cd9c90544 iconvdata: Fix invalid pointer arithmetic in ANSI_X3.110 module ebd45473f5 nss: Missing checks in __nss_configure_lookup, __nss_database_get (bug 28940) 937ef7aaf3 Linux: In getlogin_r, use utmp fallback only for specific errors 3989780591 nss: Introduce dedicated struct nss_database_for_fork type Testing Results: +--------------+--------+--------+------+ | Result | Before | After | Diff | +--------------+--------+--------+------+ | PASS | 6934 | 6938 | +4 | | XPASS | 4 | 4 | 0 | | FAIL | 76 | 75 | -1 | | XFAIL | 16 | 16 | 0 | | UNSUPPORTED | 108 | 109 | +1 | +--------------+--------+--------+------+ Changes in testcases: +------------------------------------------------------+--------+-------------+ | Testcase | Before | After | +------------------------------------------------------+--------+-------------+ | elf/tst-glibc-hwcaps | FAIL | PASS | | elf/tst-ldconfig-soname | FAIL | PASS | | nptl/tst-thread-affinity-pthread2 | PASS | FAIL | | nss/tst-nss-malloc-failure-getlogin_r | N/A | UNSUPPORTED | | posix/tst-wordexp-reuse-mem | N/A | PASS | | resolv/tst-resolv-dns-section | N/A | PASS | | resolv/tst-resolv-invalid-ptr | N/A | PASS | +------------------------------------------------------+--------+-------------+ Signed-off-by: Hemanth Kumar M D Signed-off-by: Yoann Congal --- meta/recipes-core/glibc/glibc-version.inc | 2 +- meta/recipes-core/glibc/glibc_2.42.bb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-core/glibc/glibc-version.inc b/meta/recipes-core/glibc/glibc-version.inc index 9991c024953..9f1003570d7 100644 --- a/meta/recipes-core/glibc/glibc-version.inc +++ b/meta/recipes-core/glibc/glibc-version.inc @@ -1,6 +1,6 @@ SRCBRANCH ?= "release/2.42/master" PV = "2.42+git" -SRCREV_glibc ?= "912d89a766847649a3857985a3b5e6065c51bfd4" +SRCREV_glibc ?= "a56a2943d2ce541102c630142c2eae0fbfc5886b" SRCREV_localedef ?= "cba02c503d7c853a38ccfb83c57e343ca5ecd7e5" GLIBC_GIT_URI ?= "git://sourceware.org/git/glibc.git;protocol=https" diff --git a/meta/recipes-core/glibc/glibc_2.42.bb b/meta/recipes-core/glibc/glibc_2.42.bb index a8717c0eae2..7e0aa3d5fc5 100644 --- a/meta/recipes-core/glibc/glibc_2.42.bb +++ b/meta/recipes-core/glibc/glibc_2.42.bb @@ -17,7 +17,7 @@ Allows for ASLR bypass so can bypass some hardening, not an exploit in itself, m easier access for another. 'ASLR bypass itself is not a vulnerability.'" CVE_STATUS_GROUPS += "CVE_STATUS_STABLE_BACKPORTS" -CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915" +CVE_STATUS_STABLE_BACKPORTS = "CVE-2025-15281 CVE-2026-0861 CVE-2026-0915 CVE-2026-4437 CVE-2026-4438" CVE_STATUS_STABLE_BACKPORTS[status] = "cpe-stable-backport: fix available in used git hash" DEPENDS += "gperf-native bison-native" From patchwork Thu Apr 16 06:47:31 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86235 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EB2D0F88087 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7586.1776322119711098916 for ; Wed, 15 Apr 2026 23:48:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=DFit369m; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43d7e23defbso2002411f8f.0 for ; Wed, 15 Apr 2026 23:48:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322118; x=1776926918; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=x7gLM0M8of39R2sQvm++eXO9/oPJTZEMqnB7bpqOVIs=; b=DFit369mQwfSmemcKb1GcfRbHNFyCFuUamb6WKz+Rec8J1LSTweGdycDdUj4N6nssO n0scBSwVGVkLUkPnHWDIcHqDCZuF4Mr69zp4mRrXn9gIDflUytGpRIluvYeTu6UzC+3d lTVF1z4muuYx1DMcyU07nM5NjQi8vT7CU3Ve4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322118; x=1776926918; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=x7gLM0M8of39R2sQvm++eXO9/oPJTZEMqnB7bpqOVIs=; b=lKg1CD97ZN8X6dPg7DByX4Tqh/g4VZIT5or8n4HktX77Deljy5/f3Pb3t/udz7NqQg 2SqkZjx8yFRC7voDYfy4pngL10LOp1y7+xKnbDCFl74RIy9TR8Uh6WczXSPno0XbEXT9 gHs04sSPQlph0dhpai/J0CpnTj2+qPyQkT2v0wfXF2hZR3s9/har+wO4pMvMZB47Hp1M xWsgg1RP5UrMdqzAqzGLLAewxWyaSa2BLPzfGsRhBQKG7Qq2Ye6R4JU9yWaF9NbXfd0v 6jg7eXXOlPDuCEY3V07nxtWqzx1nUsvn/cUZxH4TqUv0IeQ87n3pxzBKmJDJsuJq0ICv 7CEA== X-Gm-Message-State: AOJu0YzdObN69xPjxpohoB/sgeuwMswFp+sFeVirHlLWuhM3wSYqeaJe 1nNlNMnuR+7WpeCH+/gYeQJ5QlOfAVJ4yaIWCAjYFx4fRSDdUlxKm991Gc+4201GfhF+6dK4yTo fn6gQJUo8Yoh0 X-Gm-Gg: AeBDieu65lxDo3Al8+Fs6MVkdz+FPk7yMd1YzqaDLNWGAjIvirefSQYcE9Ai4PKWm9Q z4Y9XBEZh1A0JoQ2D9zsnrSX0/ce1bbwF0fDhbm3hGkNpAaL8FWIB5sKtyZUdDzFznY6HMk56z9 Nbcs2xYKnI+waF4uxaMd3y2vc7IOmKFuF8Zj/2SY5IkNeagfdZW6TVRPawJQd7reKxNd3oAzHkl h9fTtZJXlRWIq3LoziIzMhsZDSthFvzUVQZTn4sSiKG+RyhsoJ3Yrnqn57+owwVinaHCB3dQWaR IjI6ejHEkhuiAV9rt5uGcv3R/6hwGArsWu9YOoYQWinGtwE/SWUu3EcWtMHk3bNm9KD52WyPnTe lc+YIuzmX32TpVLsKUVfzXBPPsZ5WX6lRP6cshhbE1d5dc9LgLEB3rCxlAogKfOsHgyzrvDkHk0 QjAYD6/BOn6WGCKjSv73F65zaWKo4JArISdryhmuvZ7rStrsvNE4QccvBL/lx1XlVsnVA0JNWOJ UdmCQDBDsIABUfZTtGyAt9NoBNFuG9e4wzmEQ== X-Received: by 2002:a05:6000:2305:b0:43d:7946:badd with SMTP id ffacd0b85a97d-43d7946bb95mr22521307f8f.35.1776322117633; Wed, 15 Apr 2026 23:48:37 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:37 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 30/47] spirv-tools: backport a fix for building with gcc-16 Date: Thu, 16 Apr 2026 08:47:31 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235372 From: Martin Jansa Fixes: https://errors.yoctoproject.org/Errors/Details/905195/ when building on host with gcc-16 Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit b4801e63d1284f3fa5006f0e24f560130c2a0a4c) Signed-off-by: Yoann Congal --- ...sue-with-gcc-16-replaeces-PR-6542-65.patch | 50 +++++++++++++++++++ .../spir/spirv-tools_1.4.328.1.bb | 3 +- 2 files changed, 52 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch diff --git a/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch new file mode 100644 index 00000000000..ce58b6b8c0f --- /dev/null +++ b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch @@ -0,0 +1,50 @@ +From aab5c96b7eb237b8bcd15e28f8aff068842db4b7 Mon Sep 17 00:00:00 2001 +From: David Neto +Date: Tue, 3 Mar 2026 12:11:47 -0500 +Subject: [PATCH] opt: Fix build issue with gcc 16 (replaeces PR #6542) + (#6567) +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Compiling with gcc 16 throws this error: + +FAILED: [code=1] +source/opt/CMakeFiles/SPIRV-Tools-opt.dir/decoration_manager.cpp.o + source/opt/decoration_manager.cpp: In member function +‘spvtools::opt::analysis::DecorationManager::CloneDecorations(unsigned +int, unsigned int)’: + source/opt/decoration_manager.cpp:546:27: error: +‘MEM[(unsigned int &)&op + 24]’ may be used uninitialized +[-Werror=maybe-uninitialized] + +546 | if (op.words[0] == from) { // add new pair of operands: (to, +literal) + source/opt/decoration_manager.cpp:545:19: note: ‘op’ declared here + 545 | Operand op = inst->GetOperand(i); + | ^~ + cc1plus: all warnings being treated as errors + +Make sure that the vector is not empty before using it. + +Co-authored-by: José Expósito +Signed-off-by: Martin Jansa +Upstream-Status: Backport [c28f5937bce369dde1d645299a8c9873da43dc72] +--- + source/opt/decoration_manager.cpp | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/source/opt/decoration_manager.cpp b/source/opt/decoration_manager.cpp +index 3e95dbc35..bee7d9482 100644 +--- a/source/opt/decoration_manager.cpp ++++ b/source/opt/decoration_manager.cpp +@@ -543,7 +543,8 @@ void DecorationManager::CloneDecorations(uint32_t from, uint32_t to) { + const uint32_t num_operands = inst->NumOperands(); + for (uint32_t i = 1; i < num_operands; i += 2) { + Operand op = inst->GetOperand(i); +- if (op.words[0] == from) { // add new pair of operands: (to, literal) ++ if (!op.words.empty() && ++ op.words[0] == from) { // add new pair of operands: (to, literal) + inst->AddOperand( + Operand(spv_operand_type_t::SPV_OPERAND_TYPE_ID, {to})); + op = inst->GetOperand(i + 1); diff --git a/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb b/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb index e5aedb16208..99d4e34ec5b 100644 --- a/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb +++ b/meta/recipes-graphics/spir/spirv-tools_1.4.328.1.bb @@ -9,7 +9,8 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57" SRCREV = "7f2d9ee926f98fc77a3ed1e1e0f113b8c9c49458" SRC_URI = "git://github.com/KhronosGroup/SPIRV-Tools.git;branch=vulkan-sdk-1.4.328;protocol=https \ - " + file://0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch \ +" PE = "1" # These recipes need to be updated in lockstep with each other: # glslang, vulkan-headers, vulkan-loader, vulkan-tools, spirv-headers, spirv-tools From patchwork Thu Apr 16 06:47:32 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86225 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 563E0F8806B for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7587.1776322120228954561 for ; Wed, 15 Apr 2026 23:48:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=2le0kczn; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43eb05b1875so434919f8f.3 for ; Wed, 15 Apr 2026 23:48:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322118; x=1776926918; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dnyQthd4W5Spmw+L7gS3Gbq370V6fdiXpTS+X67Gxc4=; b=2le0kcznU0aTyDX+GuKhW6a/muYIZz7KjvtRB9RXnSfeLPp7v4iJGFdZHsB4SCR6St q1wUeBCz5UXqGITLcR49tesabZ5wy4iBL8ByR0rAe5/ze187ZA3RjeRvFK+OD2tw/bo9 o2/vGzlrF02G7ElZADGiryiti6WBEdHjIA9g8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322118; x=1776926918; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=dnyQthd4W5Spmw+L7gS3Gbq370V6fdiXpTS+X67Gxc4=; b=pOAQrM6ze9XHPm6llDwBCx+OfV4oWQmiO7LzJ91ARgGoCFVU96HsOAcmAWToAAKE2+ zqA1BE+JUCk8Z8djVl42jHm8TubUg/QKsgfQUFOdoZljpE+ejj85NaT+s+VKiXOg7843 tVqo45OjDPz+jEB90bwuEubpf0lC/e53lc6ClDr5XN4wcXiqBglJuT0lwck9SH1oNPU+ S6Y3YWSd8whaRkaYFh0pbTY515PVOsl5x++DPJQGGcfkl27QNsOsO3gg1iADdw/inYZl W86NaI2ltzhaWKzFvb5mP0R7/QidQqni4GvYjcdxowndxaiWTpwxmeHlk45vRl8DszDF kZkg== X-Gm-Message-State: AOJu0YzMjYKHiYQ+uZYZVm2i3pqwGe4Y7nTO4F4HMK5Loj7SGxr7/vcB z1U9pG+PciVlvZosQEekS5mahcl1PywbVeM4i1uCH3lvYfZ4mlyy1Zyk2MG4FhnqqeCIj6WQmTw 8Ts8HjzkM6tpH X-Gm-Gg: AeBDieuQ98pERAFS9UOQWs/kUBhaKkZJtmF7VIsy0Au1WnEfD4ufX57JMIsEqQ58aPu bFkqUL50h8AVF+FIvFfj4L9c+Hz6b/08f3Ly7XozL3wUkvvlDn8C1LcOke1UCG03XeRCLPWN2td xaLCrXzDsRYMHuE7+ZcV+lOq3JvIJDFf8shH/vXjvu/tQYo/eY6gdAEXSVLq9YQFPXRyTbv2KYX 705ZLMeyJVzkjYpX8SdeoRVihgFfY8SUsv0TUNO5NivJQWwz2u5O7fPPXR7/FoECK6xXIg8F44H uxydeUtpbPO4DINdlPyPBAzmE7BILs1x0rEeG+jd5l3Jn7PlEHedQgS42gooUByrsga45CWOLVo Sbn3y7/X8Kg356s2xvgxYl7YpLfpgBS5/WI5joBWWhd/W57FAvf0XhKlUc54eim5oSBD8cYOcwq 8GZ438TCT1piAoXdBPrF77M/0SOpFniVGgGQDK+VN7JSFTkB6SCbSUEmpW/awrEwfiX2pxc1+yX rRH0spqZyNoGBhh9TCHa/7MJVJceVM9KLRy/g== X-Received: by 2002:a05:6000:603:b0:43d:77ad:ebee with SMTP id ffacd0b85a97d-43d77adee92mr24583324f8f.9.1776322118275; Wed, 15 Apr 2026 23:48:38 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:37 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 31/47] ovmf: backport a fix for build with gcc-16 Date: Thu, 16 Apr 2026 08:47:32 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235373 From: Martin Jansa Fixes build on host with gcc-16: StringFuncs.c: In function ‘SplitStringByWhitespace’: StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=] 113 | UINTN Item; | ^~~~ and EfiRom.c: In function ‘main’: EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 78 | if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) { | ^ Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- ...Tools-StringFuncs-fix-gcc-16-warning.patch | 42 ++++++++++++++++++ ...aseTools-EfiRom-fix-compiler-warning.patch | 44 +++++++++++++++++++ meta/recipes-core/ovmf/ovmf_git.bb | 2 + 3 files changed, 88 insertions(+) create mode 100644 meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch create mode 100644 meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch diff --git a/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch new file mode 100644 index 00000000000..a465dede9c3 --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch @@ -0,0 +1,42 @@ +From 015c26aea52a54e96319887ea542870b4804fb91 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Thu, 29 Jan 2026 09:23:32 +0100 +Subject: [PATCH] BaseTools/StringFuncs: fix gcc 16 warning +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +StringFuncs.c: In function ‘SplitStringByWhitespace’: +StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=] + 113 | UINTN Item; + | ^~~~ + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/3597306191297b504683b83fe7750e49c6a2e836] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/Common/StringFuncs.c | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/Common/StringFuncs.c b/BaseTools/Source/C/Common/StringFuncs.c +index 53e44365e9..df02d9c808 100644 +--- a/BaseTools/Source/C/Common/StringFuncs.c ++++ b/BaseTools/Source/C/Common/StringFuncs.c +@@ -110,7 +110,6 @@ SplitStringByWhitespace ( + CHAR8 *EndOfSubString; + CHAR8 *EndOfString; + STRING_LIST *Output; +- UINTN Item; + + String = CloneString (String); + if (String == NULL) { +@@ -120,7 +119,7 @@ SplitStringByWhitespace ( + + Output = NewStringList (); + +- for (Pos = String, Item = 0; Pos < EndOfString; Item++) { ++ for (Pos = String; Pos < EndOfString;) { + while (isspace ((int)*Pos)) { + Pos++; + } diff --git a/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch new file mode 100644 index 00000000000..7aaafe6efbf --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch @@ -0,0 +1,44 @@ +From 4d2bdadcd6d45f6708b1b4827b0dc9b6e4b8edd2 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Mon, 8 Dec 2025 10:28:50 +0100 +Subject: [PATCH] BaseTools/EfiRom: fix compiler warning +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +New warning after updating gcc: + +EfiRom.c: In function ‘main’: +EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] + +The assigned value is not used, so fix the warning by just removing it. + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/9af06ef3cbb052b142f9660c2c01e7aeb401300c] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/EfiRom/EfiRom.c | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/EfiRom/EfiRom.c b/BaseTools/Source/C/EfiRom/EfiRom.c +index fa7bf0e62e..6e903b3504 100644 +--- a/BaseTools/Source/C/EfiRom/EfiRom.c ++++ b/BaseTools/Source/C/EfiRom/EfiRom.c +@@ -44,7 +44,6 @@ Returns: + FILE_LIST *FList; + UINT32 TotalSize; + UINT32 Size; +- CHAR8 *Ptr0; + + SetUtilityName(UTILITY_NAME); + +@@ -75,7 +74,7 @@ Returns: + // + if (mOptions.DumpOption == 1) { + if (mOptions.FileList != NULL) { +- if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) { ++ if (strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION) != NULL) { + DumpImage (mOptions.FileList); + goto BailOut; + } else { diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb index 577310a6782..bf41bbbf6e9 100644 --- a/meta/recipes-core/ovmf/ovmf_git.bb +++ b/meta/recipes-core/ovmf/ovmf_git.bb @@ -25,6 +25,8 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https;ta file://0002-BaseTools-makefile-adjust-to-build-in-under-bitbake.patch \ file://0003-debug-prefix-map.patch \ file://0004-reproducible.patch \ + file://0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch \ + file://0007-BaseTools-EfiRom-fix-compiler-warning.patch \ " PV = "edk2-stable202508" From patchwork Thu Apr 16 06:47:33 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86230 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 49A5FF88067 for ; Thu, 16 Apr 2026 06:48:42 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7728.1776322120787905209 for ; Wed, 15 Apr 2026 23:48:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=cYXU7KyJ; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43cfd832155so5231899f8f.1 for ; Wed, 15 Apr 2026 23:48:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322119; x=1776926919; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=JgzN3vRfpTmOrxp0fhFb05axKtIvQfYM/ubqTptUErs=; b=cYXU7KyJs6poHoM6jdHAMVcwGzrbRkZHyNAHCPB6tzLeoXzK+KVRq3NTLTEZYuFIFe z+GQcCKu+2SMrz6jlOMlWWJUbDJQTSQKROsrKsWrUvSIe3NNakZBZ5ba4+Ctg4e8hUX4 38RKVBZpHmm24DWyqF6t3VvcaEtaOUdSa8nwk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322119; x=1776926919; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=JgzN3vRfpTmOrxp0fhFb05axKtIvQfYM/ubqTptUErs=; b=pW2T5ZD0g//947BVMo0O+EQaVGZiUfxQ2U+fM3n39UKn4fBjh3D8+RlAk/KJwdLAve NA39oFJEu8GXQXPbH3dN+JvQhoVMj8EgZDKvBF2kFcAgNEIlSSiPLaHf672xaD9xR3VA eQHyLWTqDXIL1H1rBamHqUILGymozzSQPSPmAz7PKxNpliGEmjVUrtfpA3WdfyeDto/l JFkwVaaaQHzEPdqfptjOGkHsfhqbWzjdPTECaQeVT1/dJ4+daunnjIT9abChABMVcAM3 nuVYNWt1+LcMO5I12TXqq7aBMmtjQX2r6EDbaSmOGkwNfCZYDQwLZWdxx/bZ7DrrV5AN 0d4g== X-Gm-Message-State: AOJu0YyxfuOnLQWhMh60Xeu2o9CiPWJkvX9Yz5fbQPYStUdqKGvEpYo1 h9ULXWjqkyNXRymkj5waFYvuMgQZ+q6Re7C9F4RVWnId/RDCgFyeY5/HInmHRGhLHbZPQQe52Cz WOO8Hny0ntTRF X-Gm-Gg: AeBDieuqqlscyS57N5N6EQXjLqWrqVU7/t+NW0t/QLIi2Xua11E/UPX5mWSp0Wb+ei/ qqUc03RXGykOYQ/4Myadn/d+j0la0C1bfcOdiYxR+KGe8Domcu2HIZoRZPn/Bg+W4HZkxBK//9X 0OMIHqyrbd87f2/m7XpRVEvHaNfldVlZaq6rAWuJZDnQ/ZHbAyg59t68W6TiOXirFpp0Ror/8qv o6QGpKBMslW+Xs3FXuz8JDS02O0+1OpBT6M+nOOH2iM2AVbTx1fKPc5Zp13aGWcgsTCuNyrkJTq zy9eLMXfgtcRmF7kbsfR/BG6IcYXMSC/yQ1IsYsJH+Zc5C3fcVSZjmTaHmrQgdYuWws/WTvbYGg db+ytWKXtK2HqcNLI/4m9+FQKpSlU8TTi75odTuPGL8TGlfHeJjCPzLTtAuMtbyR/e4RyfXJUKr CllaiIXki892Pgmr9kdy8OQDn5XS+XngyxzR8bKHdetdc9OpWDgusR6OTbydbESb4LyhjNICxM8 aoaXutXLkgFs4v46eeF/9NjtUz1qu0Sv5qUiA== X-Received: by 2002:a5d:5d84:0:b0:43b:4136:1e76 with SMTP id ffacd0b85a97d-43d642b6a47mr40423199f8f.29.1776322118791; Wed, 15 Apr 2026 23:48:38 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:38 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 32/47] libpng: upgrade 1.6.55 -> 1.6.56 Date: Thu, 16 Apr 2026 08:47:33 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:42 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235374 From: Peter Marko Release notes [1]: * Fixed CVE-2026-33416 (high severity): Use-after-free via pointer aliasing in `png_set_tRNS` and `png_set_PLTE`. (Reported by Halil Oktay and Ryo Shimada; fixed by Halil Oktay and Cosmin Truta.) * Fixed CVE-2026-33636 (high severity): Out-of-bounds read/write in the palette expansion on ARM Neon. (Reported by Taegu Ha; fixed by Taegu Ha and Cosmin Truta.) * Fixed uninitialized reads beyond `num_trans` in `trans_alpha` buffers. (Contributed by Halil Oktay.) * Fixed stale `info_ptr->palette` after in-place gamma and background transforms. * Fixed wrong channel indices in `png_image_read_and_map` RGB_ALPHA path. (Contributed by Yuelin Wang.) * Fixed wrong background color in colormap read. (Contributed by Yuelin Wang.) * Fixed dead loop in sPLT write. (Contributed by Yuelin Wang.) * Added missing null pointer checks in four public API functions. (Contributed by Yuelin Wang.) * Validated shift bit depths in `png_set_shift` to prevent infinite loop. (Contributed by Yuelin Wang.) * Avoided undefined behavior in library and tests. * Deprecated the hardly-ever-tested POINTER_INDEXING config option. * Added negative-stride test coverage for the simplified API. * Fixed memory leaks and API misuse in oss-fuzz. (Contributed by Owen Sanzas.) * Implemented various fixes and improvements in oss-fuzz. (Contributed by Bob Friesenhahn and Philippe Antoine.) * Performed various refactorings and cleanups. [1] https://github.com/pnggroup/libpng/blob/v1.6.56/ANNOUNCE Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit 987cf163b4a4beaa540ad4f91b1a31bcfbd71b4c) Signed-off-by: Yoann Congal --- .../libpng/{libpng_1.6.55.bb => libpng_1.6.56.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-multimedia/libpng/{libpng_1.6.55.bb => libpng_1.6.56.bb} (97%) diff --git a/meta/recipes-multimedia/libpng/libpng_1.6.55.bb b/meta/recipes-multimedia/libpng/libpng_1.6.56.bb similarity index 97% rename from meta/recipes-multimedia/libpng/libpng_1.6.55.bb rename to meta/recipes-multimedia/libpng/libpng_1.6.56.bb index 18ecc9d855a..6ae500ca92b 100644 --- a/meta/recipes-multimedia/libpng/libpng_1.6.55.bb +++ b/meta/recipes-multimedia/libpng/libpng_1.6.56.bb @@ -14,7 +14,7 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/${BPN}/${BPN}${LIBV}/${BP}.tar.xz \ file://run-ptest \ " -SRC_URI[sha256sum] = "d925722864837ad5ae2a82070d4b2e0603dc72af44bd457c3962298258b8e82d" +SRC_URI[sha256sum] = "f7d8bf1601b7804f583a254ab343a6549ca6cf27d255c302c47af2d9d36a6f18" MIRRORS += "${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/ ${SOURCEFORGE_MIRROR}/project/${BPN}/${BPN}${LIBV}/older-releases/" From patchwork Thu Apr 16 06:47:34 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86239 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 374DEF88091 for ; Thu, 16 Apr 2026 06:48:43 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7729.1776322121774225247 for ; Wed, 15 Apr 2026 23:48:42 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=gx08OOzJ; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43d01d6b50cso7626117f8f.1 for ; Wed, 15 Apr 2026 23:48:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322120; x=1776926920; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=U2otvjNxhfg/FKlFkmYbnyjoFjWiNsNv0c4SQ18zkQc=; b=gx08OOzJqqebLj9ueWLO05X8MKwA0fhxtxaL/lKgtWQdzB3MVn0JC7Sy9W/9O+QyE8 9M21f/3qg8rdvI2GYHcPgLWFicNiv0CTXo6YVZM+zP6VPc5foJcxEsmczU6C15+EMwkO Ftas3XDoOztmHqlFvEsijZRDvi7qCVdIcV/90= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322120; x=1776926920; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=U2otvjNxhfg/FKlFkmYbnyjoFjWiNsNv0c4SQ18zkQc=; b=KRb8qX/5czsxdanOWIL027sH1vgfmMOKfAjR/R5V2PsqRA0clVHZWKAuskOx6mesFW MiJ6d9WMpYJuBYkLOgILy1jRa5pav+tvV+Znghisqa1R5SiRXIdNCTKQRlYL/t+YORoh 7EdVh7OcxwVvs0qJGj9rggeGNvpm7E1RAE6frbPOuJCwzydpA1ZRXSQlnDGJxigUoAhX jg8f4jgAevf/XAPXZizxRa0PExWmrva8fVrhNj8ORYdyV3T99KgsZAIbgq6eIk6KjIek 9smcp+1Si1YNuXKAn0Nt23tgQTvCnRLSu2oSXSEjx3eSQlg9YT4LJNve9Lr9WVS2OA8Q CC3Q== X-Gm-Message-State: AOJu0Yx6WVE1bAVJ6X+tWakZLOc1Wf6fyXEuk7I3doC9rYy3tDxbHUMl 99+m8X6KqqZ8QqaLg5HHmjw3sk4ivd/Wi2vcEFeqGPksaCA7xUqwGkYpjFWqVHZLKdP44ii791o EpN3Ib4eTRV0J X-Gm-Gg: AeBDieuBCLsmSXkxiQdaXCB0QxzMjFNpVGRzBzzI2e4Q2IFyfRYS7poftC6xRNZ2NL3 U1P6FabC7DfN359xk03ZrUNV64tXqTV95wRSeiY6F+271dn+9ZpBaGvttScJ9hvKRDnOP40PBwd Di+1qekLMrWbayrLykoNzVIwEaWHtWo914yVMpTD7Y7+X05gQ1WUIU0gdYF4LeMn78wXnAhlg1L rd6ZnIn+udsGH7J2EEIssMyVkQgLq3xnfUB2mmZPQ7ts2bxvVkINLzTip0pPu+CLRdwCUV5Noeb 6z+t//BZYrqS3eetSSHaBgTIPXI05T4wwTEBLz+XT47rWa+28FWFFxUo0CT75RRzfnUvLDwCpYL yKPyLowQVWx9cftEIyfwhgl5iDq2QN6Sv/DEFW+uHza9mRhKK4fMuImd81r6g3sX73b87gHK4BE 41z/3Cv74XooU/3UmEJ6520WG1ofPr77ZWZSZRgk5oZCs0ofa9bwE7UQDVvhHHmMAMgnF6hBoif N/XjA8JftrEIAyhurbqdoQEfBpMZKpmXm8AZw== X-Received: by 2002:a5d:5d02:0:b0:43d:1df7:ed24 with SMTP id ffacd0b85a97d-43d642a64b1mr36060783f8f.21.1776322119872; Wed, 15 Apr 2026 23:48:39 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:39 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 33/47] recipetool: Recognise https://git. as git urls Date: Thu, 16 Apr 2026 08:47:34 +0200 Message-ID: <272e0ce9cb776f14166aaddeeac9d570089e298c.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235375 From: Richard Purdie If a url has git. in it, assume it is likely to be a git cloneable url and should be treated as such. This allows us to switch from https://git.yoctoproject.org/git/XXX urls to the preferred https://git.yoctoproject.org/XXX form. Signed-off-by: Richard Purdie (cherry picked from commit cedc9209e3bae0da8d61423b16c74c49a132aa63) Signed-off-by: Yoann Congal --- scripts/lib/recipetool/create.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/lib/recipetool/create.py b/scripts/lib/recipetool/create.py index ef0ba974a99..adafaba47e5 100644 --- a/scripts/lib/recipetool/create.py +++ b/scripts/lib/recipetool/create.py @@ -368,7 +368,7 @@ def supports_srcrev(uri): def reformat_git_uri(uri): '''Convert any http[s]://....git URI into git://...;protocol=http[s]''' checkuri = uri.split(';', 1)[0] - if checkuri.endswith('.git') or '/git/' in checkuri or re.match('https?://git(hub|lab).com/[^/]+/[^/]+/?$', checkuri): + if checkuri.endswith('.git') or '/git/' in checkuri or re.match('https?://git(hub|lab).com/[^/]+/[^/]+/?$', checkuri) or re.match(r'https?://git\..*', checkuri): # Appends scheme if the scheme is missing if not '://' in uri: uri = 'git://' + uri From patchwork Thu Apr 16 06:47:35 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86254 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id ECF7CF8809C for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7730.1776322122940233739 for ; Wed, 15 Apr 2026 23:48:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0ZDhIZvG; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so101084625e9.2 for ; Wed, 15 Apr 2026 23:48:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322121; x=1776926921; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qQ+oTPOH9/tKMRLEMfTumVffv5c6sMHBTGnRX0018Kk=; b=0ZDhIZvGM+RWRh80lsvqTKEib46s+Brn16qHTlAddJ39Duf9KVe9ocCcC1rKRqA0+G M/tl0fvxhzH0A5haVVpGLmMFUB/IzaP570NvZRuRgLUhMFM7vm/mmr4NeKunpPP3rDsO ThwUTQLT45DDoNdJze6DXzBfQ3ItGSL1uFe1M= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322121; x=1776926921; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=qQ+oTPOH9/tKMRLEMfTumVffv5c6sMHBTGnRX0018Kk=; b=eLXpVm1bS0paN6kqBMZXsdegZikeOquM22k5TFPH/I/ovCEjAu0RfsGl2wjARax5vz uk/hn+h0ovmtqPCr+905I65JhrhVpc7ojJ6RH2xVq+2uOT+Y6c5dDq1j8LunpU/wP/UN 9dQNqjvDMr6OaZmch4Ml2RJsegmfAB58zXGN/S7M7m01Wn9ijOHIfRla8PaJ08MCGtpu LtUFA9UkX71aKU1a5pqpGesiExiKPO6mWVY+EXOPl+Lq96Y+HMdVS8l0rbfB/cnvqoKH BKFgsqX3scNXtB4Zn4uwgEwPy22tLjkn4QTv7kIYVS4E4jnRex1TttevJTNszx66BkiN BBnw== X-Gm-Message-State: AOJu0Yz3B2k9ZV3f/NaHqh/Oq1a/XdGRTvw3QgDdcjGKLRtCPFP/JAH5 1l/0L0tkBIMOS/CZ1Z6idoyeprQ4K6qzt1fNAGsPVWRLx7HMzR+EvSafmalCcdTE/DX8WnMKhxH Sr6U1G1s0wRyB X-Gm-Gg: AeBDietMUYKq1CeZLL+RX6b1CgfgStIYNpTO83T7+RxmXa5YXGnYV86nOpPfsIdhu4a SrKvSPj2gPm5qyhVq4Ad86Op6yDKNf6ISLXPbUW2venlBi9F//mgWRfqDqvFeTjlpHlvamFcNS1 rgQ/FmdMCcKfplCJqVzGSOj7NOQkeD8PKjplLUuzq7/VFCvD/dDyfY9axy5S4TmyYWjGoIEW79w 9zBfZTog+s66yFoIhDXUrqFwtUsmXLlxmatvkFmpyJiVfwHJsE9zsjhyjwV/r9oIMIu1mF/NXc0 MkNzgydXSb3ud/tUohY2fKZKCrTVKxxwbBFILKfqy0jlOdMdKG6sLGDSnzxXF48eJnQlWTedWmf xk6wQYST6Sclsl8OAl6zecpDkyoO84iNlWg0bCWG78CtywLFGrwhZWCKmFM83DXBknOziRdyCYH Cu0AKfjxLaD4BqudR2CuyMI7X5jg2dfftD3YOSJGeR/4a9Cmcy1KzJ6N2Nszdaal66WXJmKtffP QhlzUGG4yP26tE3e7s599g9bkvg2Y35IXHsWw== X-Received: by 2002:a05:600c:64cd:b0:487:21c7:2885 with SMTP id 5b1f17b1804b1-488d67df57dmr342808645e9.5.1776322120867; Wed, 15 Apr 2026 23:48:40 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:40 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 34/47] selftest/scripts: Update old git protocol references Date: Thu, 16 Apr 2026 08:47:35 +0200 Message-ID: <4825bf044255dfff2d2ce5b288aff006ec5dd584.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235376 From: Richard Purdie git protocol accesses to our infrastructure are currently struggling and this has highlighted a number of places we're making those obsolete access forms. Update them to use https instead of the git protocol since it is preferred and more reliable. The devtool test needed quoting to handle the ';' in the url. The -f option to devtool also shows a deprecation warning so remove that. There were internal references to git protocol urls inside the nested git submodules test report, which means those repos need updating to use new git revisions. Signed-off-by: Richard Purdie (cherry picked from commit 1ceba42623c5187d2f5a100d6a523abcdc75d34e) Signed-off-by: Yoann Congal --- .../recipes-test/devtool/devtool-upgrade-test2_git.bb | 2 +- .../devtool/devtool-upgrade-test2_git.bb.upgraded | 2 +- .../recipes-test/devtool/devtool-upgrade-test5_git.bb | 4 ++-- .../devtool/devtool-upgrade-test5_git.bb.upgraded | 4 ++-- meta/lib/oeqa/selftest/cases/devtool.py | 6 +++--- meta/lib/oeqa/selftest/cases/externalsrc.py | 2 +- meta/lib/oeqa/selftest/cases/gitarchivetests.py | 2 +- meta/lib/oeqa/selftest/cases/sstatetests.py | 2 +- meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py | 2 +- scripts/yocto_testresults_query.py | 2 +- 10 files changed, 14 insertions(+), 14 deletions(-) diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb index 66d66e95e29..fdc85243787 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb @@ -11,7 +11,7 @@ SRCREV = "1a3e1343761b30750bed70e0fd688f6d3c7b3717" PV = "0.1+git" PR = "r2" -SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master" +SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded index d3256ef5df8..07f7c50c775 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded @@ -10,7 +10,7 @@ DEPENDS = "dbus" SRCREV = "6cc6077a36fe2648a5f993fe7c16c9632f946517" PV = "0.1+git" -SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master" +SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb index 7e8b001a287..f2a1358c8aa 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb @@ -6,11 +6,11 @@ LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda INHIBIT_DEFAULT_DEPS = "1" # Note: this is intentionally not the latest version in the original .bb -SRCREV = "132fea6e4dee56b61bcf5721c94e8b2445c6a017" +SRCREV = "f280847494763cdcf71197557a81ba7d8a6bce42" PV = "0.1+git" PR = "r2" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded index 938c46b0163..aa0d72f0ed1 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test5_git.bb.upgraded @@ -6,10 +6,10 @@ LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda INHIBIT_DEFAULT_DEPS = "1" # Note: this is intentionally not the latest version in the original .bb -SRCREV = "a2885dd7d25380d23627e7544b7bbb55014b16ee" +SRCREV = "0a60d6af95d22b4c50446559cd41942a8acd2d57" PV = "0.1+git" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index c7bd1831a9c..73a79b21041 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py @@ -584,7 +584,7 @@ class DevtoolAddTests(DevtoolBase): def test_devtool_add_fetch_git(self): tempdir = tempfile.mkdtemp(prefix='devtoolqa') self.track_for_cleanup(tempdir) - url = 'gitsm://git.yoctoproject.org/mraa' + url = 'gitsm://git.yoctoproject.org/mraa;protocol=https' url_branch = '%s;branch=master' % url checkrev = 'ae127b19a50aa54255e4330ccfdd9a5d058e581d' testrecipe = 'mraa' @@ -593,7 +593,7 @@ class DevtoolAddTests(DevtoolBase): self.track_for_cleanup(self.workspacedir) self.add_command_to_tearDown('bitbake -c cleansstate %s' % testrecipe) self.add_command_to_tearDown('bitbake-layers remove-layer */workspace') - result = runCmd('devtool add %s %s -a -f %s' % (testrecipe, srcdir, url)) + result = runCmd('devtool add %s %s -a "%s"' % (testrecipe, srcdir, url)) self.assertExists(os.path.join(self.workspacedir, 'conf', 'layer.conf'), 'Workspace directory not created: %s' % result.output) self.assertTrue(os.path.isfile(os.path.join(srcdir, 'imraa', 'imraa.c')), 'Unable to find imraa/imraa.c in source directory') # Test devtool status @@ -1996,7 +1996,7 @@ class DevtoolUpgradeTests(DevtoolBase): self._test_devtool_upgrade_git_by_recipe('devtool-upgrade-test2', '6cc6077a36fe2648a5f993fe7c16c9632f946517') def test_devtool_upgrade_gitsm(self): - self._test_devtool_upgrade_git_by_recipe('devtool-upgrade-test5', 'a2885dd7d25380d23627e7544b7bbb55014b16ee') + self._test_devtool_upgrade_git_by_recipe('devtool-upgrade-test5', '0a60d6af95d22b4c50446559cd41942a8acd2d57') def test_devtool_upgrade_drop_md5sum(self): # Check preconditions diff --git a/meta/lib/oeqa/selftest/cases/externalsrc.py b/meta/lib/oeqa/selftest/cases/externalsrc.py index 1d800dc82ca..c127d254e36 100644 --- a/meta/lib/oeqa/selftest/cases/externalsrc.py +++ b/meta/lib/oeqa/selftest/cases/externalsrc.py @@ -17,7 +17,7 @@ class ExternalSrc(OESelftestTestCase): # so we check only that a recipe with externalsrc can be parsed def test_externalsrc_srctree_hash_files(self): test_recipe = "git-submodule-test" - git_url = "git://git.yoctoproject.org/git-submodule-test" + git_url = "https://git.yoctoproject.org/git-submodule-test" externalsrc_dir = tempfile.TemporaryDirectory(prefix="externalsrc").name self.write_config( diff --git a/meta/lib/oeqa/selftest/cases/gitarchivetests.py b/meta/lib/oeqa/selftest/cases/gitarchivetests.py index dcf0eb3be56..454f4bd4683 100644 --- a/meta/lib/oeqa/selftest/cases/gitarchivetests.py +++ b/meta/lib/oeqa/selftest/cases/gitarchivetests.py @@ -105,7 +105,7 @@ class GitArchiveTests(OESelftestTestCase): delete_fake_repository(path) def test_get_tags_without_valid_remote(self): - url = 'git://git.yoctoproject.org/poky' + url = 'https://git.yoctoproject.org/poky' path, git_obj = create_fake_repository(False, None, False) tags = ga.get_tags(git_obj, self.log, pattern="yocto-*", url=url) diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py index 44dd674a325..687640a4016 100644 --- a/meta/lib/oeqa/selftest/cases/sstatetests.py +++ b/meta/lib/oeqa/selftest/cases/sstatetests.py @@ -221,7 +221,7 @@ class SStateTests(SStateBase): # Use dbus-wait as a local git repo we can add a commit between two builds in pn = 'dbus-wait' srcrev = '6cc6077a36fe2648a5f993fe7c16c9632f946517' - url = 'git://git.yoctoproject.org/dbus-wait' + url = 'https://git.yoctoproject.org/dbus-wait' result = runCmd('git clone %s noname' % url, cwd=tempdir) srcdir = os.path.join(tempdir, 'noname') result = runCmd('git reset --hard %s' % srcrev, cwd=srcdir) diff --git a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py index b1015d60efe..be062cf7839 100644 --- a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py +++ b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py @@ -36,4 +36,4 @@ class TestResultsQueryTests(OESelftestTestCase): shutil.rmtree(workdir, ignore_errors=True) self.fail(f"Can not execute git commands in {workdir}") shutil.rmtree(workdir) - self.assertEqual(url, "git://git.yoctoproject.org/yocto-testresults") + self.assertEqual(url, "https://git.yoctoproject.org/yocto-testresults") diff --git a/scripts/yocto_testresults_query.py b/scripts/yocto_testresults_query.py index 521ead8473a..08bd8cbff17 100755 --- a/scripts/yocto_testresults_query.py +++ b/scripts/yocto_testresults_query.py @@ -21,7 +21,7 @@ script_path = os.path.dirname(os.path.realpath(__file__)) poky_path = os.path.abspath(os.path.join(script_path, "..")) resulttool = os.path.abspath(os.path.join(script_path, "resulttool")) logger = scriptutils.logger_create(sys.argv[0]) -testresults_default_url="git://git.yoctoproject.org/yocto-testresults" +testresults_default_url="https://git.yoctoproject.org/yocto-testresults" def create_workdir(): workdir = tempfile.mkdtemp(prefix='yocto-testresults-query.') From patchwork Thu Apr 16 06:47:36 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86253 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 17920F8809D for ; Thu, 16 Apr 2026 06:48:54 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7588.1776322123536965369 for ; Wed, 15 Apr 2026 23:48:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=q2Mz5gii; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso91627765e9.2 for ; Wed, 15 Apr 2026 23:48:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322122; x=1776926922; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=whCwqBJh3d3qNfBeye3GzVfXJB2JnvzIkn5icCEhv/g=; b=q2Mz5giinF8k4bgezkgNcf738Xg3y3FxMY5D0yvGEn38tSBrFr2NaY+gAChjVwi4ag 8bi0xM4nIVRe8G/EIe+uqHLLx689hw9jDRmzxZE9tqXbIT0xPzwTNTbdReBlmpuwBRSV Ew+39qW83sfK8Y3cAHLkrK9jlBE3l+gQQi5O8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322122; x=1776926922; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=whCwqBJh3d3qNfBeye3GzVfXJB2JnvzIkn5icCEhv/g=; b=WWNRsPFTJ+Mgt0p7ky43ZmTn+TdoFWTpVaVKMKrxDb+ppS4mkug8QJgm2FgkRvAlXO x/rJep40fZWbf4Iopuj/wgtsGRl6xtANXirkMc1ZOdlfEwVXBdPRl+hNyKK5TMJw1lMi 9L9cDtHqQxnGEeLwSNYTn1OnVimXZtQ5siqDoEG0Sh0ClCISMmxJKVpU1rxrikJPWfXk IJ9iPP5XiHbEfv0laliO97XpzNNpsN12ISWx/qw8KTgwzmNMZQcyeV6C7hFLl0KTLKLj QlhHS9RvRJhsiXqYZ4Nj2pdqQVNApudPbF2hm9XYVfdbWobMSGGhfBhIIm5cOHiv6S5+ ga7A== X-Gm-Message-State: AOJu0Yx39tVWJLyYcY6abw/vXI3sJijI6CzdusgCp39FzPkj8Yo5vUsI z7hPMuTa0qAovGtZgeut13SiSubZkXoq1ArMKUbLME/oT8ix4fN6wKxzFowZUbixGJnKQcOoVOi 7rec0E5bOkd7V X-Gm-Gg: AeBDievlxvcvVrZmJY8zgS3v+Zj3HZQT7uj9hDvBsHarLP00qdCq7ZCWRc9m4d7rI5y aXTPFAZo+bLzfwp74vTLVx2Iw/ONXiPJ2WynPdkc1i54FmOV9TgHfFsStzWmwGxtxcovcw9631T nSzBvhbZekemBFAf+ffApvQjqtMtG360CoefPdeBjtM3JKtfw6+Vdfo1P1Og88p1yfj+xgbDSBI 3Xc8yAJLNHn7WTzKnxBO6sdoLeoAWFd/1UdoHIb/GX2jxcTDsCXmOcr4UhG1/A3TG+T6ar4M4Ua 4gmt7Za4oWywTX/JlC8A+fKl8XUaRAnOJf6i8QZ47AlGdP+s9UgPzq+qDgAKp+HQL+X6ONYo5+d 01z5ZzccLBctjk937UYcTJugeVbkwgrx7f7Bv+lomp860LDWdONWwgpVdASSbV2NoVY5kKDyiK1 Lk6ZQ1+FBFDqadt5JIv3WUGzCPwLmpDNixXDD9x2GPeML+u5+/0h08qcelBegYGufaasddLpbOB +jHQT+3zN3mrhlBiYkvmTYBBS+r7pHRdTvX1w== X-Received: by 2002:a05:600c:474c:b0:488:a2ac:a340 with SMTP id 5b1f17b1804b1-488d67e7212mr297733585e9.12.1776322121524; Wed, 15 Apr 2026 23:48:41 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:41 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 35/47] archiver: Don't try to preserve all attributes when copying files Date: Thu, 16 Apr 2026 08:47:36 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235377 From: Richard Purdie Similar to https://git.openembedded.org/bitbake/commit/?id=2f35dac0c821ab231459922ed98e1b2cc599ca9a there is a problem in this code when copying from an NFS mount. We currently use cp -p, which is a shortcut for --preserve=mode,ownership,timestamps. We shouldn't need to preserve mode/ownership, only timestamps. Update the code in the same way the bitbake fetcher was fixed for consistency. This fixes build failures on OpenSUSE 16.0. Signed-off-by: Richard Purdie (cherry picked from commit 6e8313688fa994c82e4c846993ed8da0d1f4db0e) Signed-off-by: Yoann Congal --- meta/classes/archiver.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes/archiver.bbclass b/meta/classes/archiver.bbclass index a95c899a0f8..a48dd259fa6 100644 --- a/meta/classes/archiver.bbclass +++ b/meta/classes/archiver.bbclass @@ -398,7 +398,7 @@ python do_ar_mirror() { # We now have an appropriate localpath bb.note('Copying source mirror') - cmd = 'cp -fpPRH %s %s' % (localpath, destdir) + cmd = 'cp --force --preserve=timestamps --no-dereference --recursive -H %s %s' % (localpath, destdir) subprocess.check_call(cmd, shell=True) } From patchwork Thu Apr 16 06:47:37 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86244 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 91DEEF8808B for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7731.1776322124184819910 for ; Wed, 15 Apr 2026 23:48:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=f4ErVb5W; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488ad135063so73900645e9.0 for ; Wed, 15 Apr 2026 23:48:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322122; x=1776926922; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MYFTEJZe4DIV7YB1HGlxm7n6+5/dpCJAZhYQu3GUKHQ=; b=f4ErVb5WXsh8R7PJ5yIwDm4UOZGk7u/o1pQbr5je3Ion5qWWMi7e88llsFEYI7uxnV Im31m/3fKiHDRTbl4zYpOlYh+2iYQ0N2k6y8SrjTfVJVTUgWX8jBeEtSm6IgB+zyuPHM rTmEo+lEo89TRJfXAxfjWNJeDqmQM/9w/j1hg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322122; x=1776926922; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MYFTEJZe4DIV7YB1HGlxm7n6+5/dpCJAZhYQu3GUKHQ=; b=cg2CM0rHMXPvmYDY98ncUmkMgd0omQO9Cpd4NUCEz3s5CihaP8ejQWAL0rmHNRyYb9 1Iko7KIZhfVGxTDbMm85fwd6JQ2HpcIcGyDqYzOvS5xCahX5D3YDLRHECXioD2zxGzXJ qqJdUz/dBsvg3PF+EdXV8pruwujKrvpfiQKiCF7jncYWiXD20pB2J9JhBidlfXRp3Gxq HHofZT1SCiQvs7N7dA7ARNcSGn2ZE6TOJSPpXGm9Rj4yXrjLIsP2TET46tCjdFzFeqBI qmv7+gj28Asa7b8k3uzT3kYxMb5H+KmQw5INjCgJmKzzX6T9C5uoI8NIzmatXddrLHfn BeZg== X-Gm-Message-State: AOJu0YxsoMJr49udU0euNE+LIyC6xVHavUAM3Jtdow3Rqf5aeXULfBVK 7tkc4RIXKEJQWziYq6uprmJ1PFqh7Yk8D0cHba3IBVnxSuJj5BYvqHSKRHuWsAzqOaEIXZPJFFX 3ZfjXwEZC603m X-Gm-Gg: AeBDievgHZHRL5bqQb+h/LzD2skx/XBD/+q4rpRgv3G73NQvmvhrMpoSq7GsMWH3OFR A/ujgPLPEYAjvpKDx1/F1HahS3vAd0c46Eakrv4r+GwFJeN80AYKL4C0WBLr59bQ6B1mfVkOe50 1ayxjwaQkaf28xrGn3pFVuFYTkTW7NzBDY+f+eCTXGaKXRDgjotIbu3qMRRpQGy/v17LXHRdRqU ZQW9Iq9r4eqqpwEx4sus6UYZdF5wI0itn7n+lpPsx+gFM+YXPHQsFpkbeYeekAp6DcEoUFc+naF UxZxaIiF8tnf8lMpffCZW4RG7wTckluVNMKztJnwym4TGrN1IYMy6U1puSiB2Hk5OOJpQyzW1kp VQHb+URRktxrwpJcwZkOd/yMowIxdghCYHlDGp/PM2YRw12CFN7TP7Jb1M92t8Wbp7uas0g9oQu VwMmCWQQYs6O0y8Kntr9V5cS9oa1CEDXpgz5hletmx2VyTJx6WJXIsjYHx3TzCC9g+/1RcIjWg+ SoRgw2qMDHUjA4lDdBtvJ9eI9NumUtts+91qm9Vl/23Qu3U X-Received: by 2002:a05:600c:674f:b0:488:a82f:bb9b with SMTP id 5b1f17b1804b1-488d68cb47amr351437015e9.30.1776322122161; Wed, 15 Apr 2026 23:48:42 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:41 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 36/47] license.py: Drop visit_Str from SeenVisitor in selftest Date: Thu, 16 Apr 2026 08:47:37 +0200 Message-ID: <4bffedef91d04e848a4a31e2618b837d2b82436a.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235378 From: Sunil Dora ast.Str was deprecated in Python 3.8 and removed in Python 3.14. In [1], visit_Str was already removed from the LicenseVisitor subclasses (FlattenVisitor, ListVisitor) in oe/license.py since bitbake now requires Python 3.8+. However, the test-only SeenVisitor class in the selftest was missed at that time and still uses visit_Str/node.s. On Python 3.14, ast.Str is fully removed so visit_Str is never called, causing test_single_licenses to return [] instead of the expected license list. Replace visit_Str/node.s with visit_Constant/node.value in SeenVisitor. [1] https://git.openembedded.org/openembedded-core/commit/meta/lib/oe/license.py?id=6d3da37adbcaf5a7a3dade08f9d052571b195249 Fixes [YOCTO #16220] Signed-off-by: Sunil Dora Signed-off-by: Richard Purdie (cherry picked from commit 8a5b019eec72676893507d018e7609745d2e3f49) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/oelib/license.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/oelib/license.py b/meta/lib/oeqa/selftest/cases/oelib/license.py index 5eea12e7619..49b28951f76 100644 --- a/meta/lib/oeqa/selftest/cases/oelib/license.py +++ b/meta/lib/oeqa/selftest/cases/oelib/license.py @@ -12,8 +12,8 @@ class SeenVisitor(oe.license.LicenseVisitor): self.seen = [] oe.license.LicenseVisitor.__init__(self) - def visit_Str(self, node): - self.seen.append(node.s) + def visit_Constant(self, node): + self.seen.append(node.value) class TestSingleLicense(TestCase): licenses = [ From patchwork Thu Apr 16 06:47:38 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86246 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B73D8F88094 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f48.google.com (mail-wr1-f48.google.com [209.85.221.48]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7589.1776322124737290927 for ; Wed, 15 Apr 2026 23:48:45 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=mNfyvEVw; spf=pass (domain: smile.fr, ip: 209.85.221.48, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f48.google.com with SMTP id ffacd0b85a97d-43cfac48bc7so5272812f8f.0 for ; Wed, 15 Apr 2026 23:48:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322123; x=1776926923; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=g1sjjgMJpj1M94vEE/TxwPq6m7Lyysw0wegXrHYT2Zs=; b=mNfyvEVw5bMSC+viGhuHsyiMjo8P9m5/OZfQcJprarNUbQCqsQuYNnZMrbf99bXB0u Rbf2azJnzk93YLMtkHDvPTV0tY/Tk8py8HLtlHEkoPPPnLq83nuRBE8pWk9rBhgwPzSE gZM7niR+KhPcz4vux4V/IC1bsQQdhdIJN2GUQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322123; x=1776926923; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=g1sjjgMJpj1M94vEE/TxwPq6m7Lyysw0wegXrHYT2Zs=; b=JkIdkJ8mhowWZKsWK9VroCkEJ2Z0FuylOMbaq3nFsfO+iU2Pbc1gYDqDGGT2s4xg7j 9DCimV7n4mE7VDkQOQfCKg8+85bsortPoqat47G6zKtgIHE3PIoIpxl6lFVnVLgTu2dp z7OyBpC//M6YJlHVpxwuiAZUtaY+nZB1Z40wP7XZuQE0rmCcNpNEk55aR6Lqs3BxXRRK PvlLPDiXvOW41sf3wiBAznGeEXt/h/0na0o44zXXLoIv8kTzZH2FLcHp1GN7SECn0gVl StfoMuwLeLn1r/VuJW7eqASaRjuFG47OxSxmVqdZtEgFBHIegzGqFQAEgW1DpIvOUzsx hkMg== X-Gm-Message-State: AOJu0Yy+leH8V2Z3iD3Sb8Dg12TUW3y6snjuIUL0vEDuKOmxL93UWED/ xtEl5Sz82J2DdKjAlzIqOwNdyhXlBSaWpw+eD0S+DysW6pHoQsVw5bZR+v3XagBbYF6dq/ezzaY G4SV7oipY4w== X-Gm-Gg: AeBDiessnIHXvgwu2pPDG15OvFF1ASdTiiVNg41cuODcbB+i3CiHP+LhdLwaDCgy4E8 CaEr264yZEW/BJDc/HpzXqpHh7TvzmrpSGQvgYue5kRqZZdv57KUQ/8e48dONYbnkexPAuQcDCl QCLVvG1sH2TsByer0nbZoTVeGSKbUgKxQbVtx34V4FPSSK7IdzmFkTq1zV7OrM+RK0ch9DU1QX9 ssyihpKzGLt9fatCjq/SJAktIdSrPxg91yhRZINocRxKeUGAAP3SQ/cpKGP54cnBXr47Mh2MqSk 52shEjU6XUshk7OwRqI+PL52zf+225YmaGygmabFhgn/tp/XqDSzQqF4o4y3387yk7B6be7QoqL JKkGjH8whbi5Onm3X19AXzpvLO3A81Uf7uo25ebMnwk5ySS4lTaSuZrF+ymdP2u2s2vX5p7368w DmsPsFYDoqMSlvJl6jUvbJCBKNV6YX1WiQ1YiTZMfBpb5s2OmfehHOyAXHEhJplxdW7qwyEeeFV OsW4LXaFLKbzmaql88+72O5BrD5bf6/6Ntxkw== X-Received: by 2002:a05:6000:290b:b0:43d:77a8:3bb5 with SMTP id ffacd0b85a97d-43d77a83d38mr22326766f8f.37.1776322122785; Wed, 15 Apr 2026 23:48:42 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:42 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 37/47] oeqa/selftest/devtool: add vulkan feature check for test needing it Date: Thu, 16 Apr 2026 08:47:38 +0200 Message-ID: <6f9c690d34938522c850f49b818601bea7752817.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235379 From: Yoann Congal When run with a distro without 'vulkan' DISTRO_FEATURES: $ oe-selftest -r devtool.DevtoolUpdateTests.test_devtool_git_submodules 2026-04-14 14:36:57,036 - oe-selftest - INFO - test_devtool_git_submodules (devtool.DevtoolUpdateTests.test_devtool_git_submodules) vulkan-samples is unavailable: vulkan-samples was skipped: using DISTRO 'nodistro', which is missing required DISTRO_FEATURES: 'vulkan' 2026-04-14 14:37:13,002 - oe-selftest - INFO - ... ERROR 2026-04-14 14:37:13,002 - oe-selftest - INFO - Traceback (most recent call last): File "/.../openembedded-core/meta/lib/oeqa/selftest/cases/devtool.py", line 1695, in test_devtool_git_submodules self.assertIn('gitsm://', src_uri, 'This test expects the %s recipe to be a git recipe with submodules' % recipe) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/usr/lib/python3.13/unittest/case.py", line 1171, in assertIn if member not in container: ^^^^^^^^^^^^^^^^^^^^^^^ TypeError: argument of type 'NoneType' is not iterable This is caused by vulkan-samples being skipped because it needs the vulkan DISTRO_FEATURES. Note that this is not seen in testing because nodistro has vulkan enabled by default since 2e1e7c86064 (bitbake.conf: Enable opengl ptest multiarch wayland vulkan in DISTRO_FEATURES by default, 2026-02-21) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/devtool.py | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index 73a79b21041..23849b0bf2f 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py @@ -18,6 +18,7 @@ from oeqa.selftest.case import OESelftestTestCase from oeqa.utils.commands import runCmd, bitbake, get_bb_var, create_temp_layer from oeqa.utils.commands import get_bb_vars, runqemu, runqemu_check_taps, get_test_layer from oeqa.core.decorator import OETestTag +from oeqa.core.decorator.data import skipIfNotFeature from bb.utils import mkdirhier, edit_bblayers_conf oldmetapath = None @@ -1685,6 +1686,7 @@ class DevtoolUpdateTests(DevtoolBase): # Try building bitbake('%s -c patch' % testrecipe) + @skipIfNotFeature('vulkan', 'Test requires vulkan to be in DISTRO_FEATURES (operates on vulkan-samples)') def test_devtool_git_submodules(self): # This tests if we can add a patch in a git submodule and extract it properly using devtool finish # Check preconditions From patchwork Thu Apr 16 06:47:39 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86250 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 123E6F8809F for ; Thu, 16 Apr 2026 06:48:54 +0000 (UTC) Received: from mail-wr1-f46.google.com (mail-wr1-f46.google.com [209.85.221.46]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7590.1776322125760237495 for ; Wed, 15 Apr 2026 23:48:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=iZ6QbxHY; spf=pass (domain: smile.fr, ip: 209.85.221.46, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f46.google.com with SMTP id ffacd0b85a97d-43d43e09de5so4530134f8f.1 for ; Wed, 15 Apr 2026 23:48:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322124; x=1776926924; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CFm7VjounM+gu7O7oiKUuw+UTStgcv5QPDvogYmbpV4=; b=iZ6QbxHYibb2aIbIbcOV6yhsNg6JI7Fihd6aT4TUnkN3tESaV5Apyxrus8JQTd270U OB4A05GmeUzIOnb/MGGe24pveu8/o3B4D6hxrhfQE7cg5KVCfOOGG/iAnIfV56DPR5AO 2Qp8DkRnyMeKSgUpCQ5L9hqWHBvysNNvVVRq8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322124; x=1776926924; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CFm7VjounM+gu7O7oiKUuw+UTStgcv5QPDvogYmbpV4=; b=dL1WzSZAW/MArZoYfki8l3q8x59oF1G+M1/zOHdpfMu/M2Ar/LnRLxb5K7LNxNBh5L pFmHKsS/AxwYkVvwhKl0SsUUseBk3s9oMtFnFpdw7p8vK5kqpbh19puWulOkx4qf5muk CihyWr7YRVUpcpWUOqt0iGIkLyFwA50uvlr+EFqrwIx5bXCWIjUErXqPS3LT0JdvpouW /qZGK31+yTmdZghDHkeE+GjH73Y8fPZJayG+mpddjOS81SM3OZBrP6aMbmikvbiOK5W4 F3DDLqeSQBv6edk9XzyaDCl1QPvvl6UjqwRCm3p+0SN72iuGyM5E1ZDXIJQhhKOW9w0x 15tg== X-Gm-Message-State: AOJu0YyQUNchlPAq+IuPxjSOMgiw9AB+8/MpUo7P+//jSf93fCRibhaf OyCwVdHrCTYWdKHjDyk8l+F1oT7omKlDwu4itoqgHhl3bvsaSIat8lxvcD5oqh3VEvYc55aZDab oGbEFFwhuqA== X-Gm-Gg: AeBDiet9zx9zCpUyfVG/PFIWArkMb7rAkVn4HDmgHa4sdIDno9tvZ639tSqe2ipkMiG IKYU7J9PoN3fBQf5hq0g+g7sWyAt28sr+y0mcVc+lLTHVzBTuuhOPvYLNTTLsJqej05R/2DquGx vN659o21AlllW5YLBfxtnerkM3n+6zEhKvExHnCTkYsn4Pc/2LXip2ypM2R89w6UVL0B44sdH5l aXoLvPAz74zGZZ8lx6nognflVhF5x+Pt1w70uM9QS5k5axynXWpTQTR2+6ERxMMQlTkKxTLwGv/ lvjwGcICRenwC+8CTKRkdvlS4n1gkNZiEP+dVK5TlCc2kA9LxBnDJB4rueObqzpQYd2kaE8NsdM UrLeJW1NdYlkDwx27kMm798WP0UYPkBAvuMF9t26a1DJi4SiDlb1n+HdZeQF5fxA2usj1R7S4vw YrljI0OC1IJ2G6LFltqWgh+pqA6HqUxesKz14+dNY9tpQppeZuH9XO74YPaEw4Pr9QgMURVrTiK OnPJzeDIZKINhSCLo8XPqEJIXQwPBowbbruWA== X-Received: by 2002:a05:6000:1acb:b0:43d:7a97:78c6 with SMTP id ffacd0b85a97d-43d7a977a20mr22227431f8f.35.1776322123794; Wed, 15 Apr 2026 23:48:43 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:43 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 38/47] selftest/minidebuginfo: extract files from tar archive using tarfile module Date: Thu, 16 Apr 2026 08:47:39 +0200 Message-ID: <99d513c47f2feeffe442ac9344a13350f65a1cc8.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235380 From: Alexander Kanavin Python 3.14 added security checks around archive extraction, and by default will refuse to handle symlinks with absolute paths. It's possible to handle this using 'filter' argument, but it is not always available in older Python versions on various host distributions we need to support, so let's extract only the needed files directly using tarfile module. busybox is itself a symlink to busybox.nosuid, so both are extracted. [YOCTO #16195] Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit d52d00a3bb4a1ba93e88f1d24d8bb99d6aa321eb) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/minidebuginfo.py | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/minidebuginfo.py b/meta/lib/oeqa/selftest/cases/minidebuginfo.py index a8923460f90..5f37522c325 100644 --- a/meta/lib/oeqa/selftest/cases/minidebuginfo.py +++ b/meta/lib/oeqa/selftest/cases/minidebuginfo.py @@ -6,7 +6,7 @@ import os import subprocess import tempfile -import shutil +import tarfile from oeqa.core.decorator import OETestTag from oeqa.selftest.case import OESelftestTestCase @@ -33,7 +33,10 @@ IMAGE_FSTYPES = "tar.bz2" # ".gnu_debugdata" which stores minidebuginfo. with tempfile.TemporaryDirectory(prefix = "unpackfs-") as unpackedfs: filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "{}.tar.bz2".format(bb_vars['IMAGE_LINK_NAME'])) - shutil.unpack_archive(filename, unpackedfs) + with tarfile.open(filename) as tar: + tar.extract("./bin/busybox", path=unpackedfs) + tar.extract("./bin/busybox.nosuid", path=unpackedfs) + tar.extract("./lib/libc.so.6", path=unpackedfs) r = runCmd([bb_vars['READELF'], "-W", "-S", os.path.join(unpackedfs, "bin", "busybox")], native_sysroot = native_sysroot, target_sys = target_sys) From patchwork Thu Apr 16 06:47:40 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86251 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BFD14F88096 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f68.google.com (mail-wr1-f68.google.com [209.85.221.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7591.1776322126252432599 for ; Wed, 15 Apr 2026 23:48:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BPlWFS/H; spf=pass (domain: smile.fr, ip: 209.85.221.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f68.google.com with SMTP id ffacd0b85a97d-43cfbd17589so5389068f8f.0 for ; Wed, 15 Apr 2026 23:48:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322124; x=1776926924; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8x20e9wxeDlAXdEuZpXs2g/DEGuOIR/2HUSKnMHglAo=; b=BPlWFS/HLU/c1GMzqWAJUkwjDZHYuhuw0gnogFvpVuXDI3vXvgAKnKA2QYDRpDWgxg mVQJmi1WlAd/ZFLhQ4Nol60AlEpZ8Jz+Npl+49FvU4qacqYkrdvgCVem4dlbqVMjl/Zc P6Yxdp3Io7+xr8znpEi3vhiEphLW8Ejfp4Quo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322124; x=1776926924; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8x20e9wxeDlAXdEuZpXs2g/DEGuOIR/2HUSKnMHglAo=; b=bBwmETiNo4iNetP4Oiv29PNW3YP0gC49EYmfBDaUDOHYbZWlp+4x3zKBsVw7SEMh3v ST0XNaLrFpVhWL5dGDAmEqw5mRNW3lk+dM4w6Vg33qbHac72YvvY7kL/aHcn4JB2+01Q DDanBuo886Rm8P7mPD0MZ6EZL4i6LRuMVI00J/AlnOaWTLxpDPhUT1jKS0yqslI+oNJg mxTQJKeHMYPMWRzYw5EnUsHgR1spZ/F/j/8EzK0TMnNkTZd+yGtCEldRG8RUbeC2/oby Xm6OrKPRFylVKhoY+ZHiXxrPi1Cq8mxUtxJkB92X348EJukKvz5kddRbuFz4aTlDUgKm ylew== X-Gm-Message-State: AOJu0Yzq91OHFSQzWb/KgCkdAtM1cdFgsHsEuRP/fKaHDJA9xpr1sT56 hTM9UrRuAs/QTEwT9SGLeR224PSEVnNSFt9059LbbGbhUNhNY22f/iQBqZWvI3JWwR0oWiyQDVc UFG4GJOBGmSyD X-Gm-Gg: AeBDieuUvRvD+w2m6lmEnfT7a/o0JXcCY8qX3SMl7KQfmhRHCr7tuGFBXjFdnXFryxh 5PIS322uzxikPBlWONMsIE1LHY5EAFkWTlozyXk/uuMxEAsdm20EPNkoop8WQHEaDMM+BKBJkn4 BO8maYiHDUk+POjlsxeS9Cm4xru3+dhZCm5hXFXE7dsP0tMzD7rAdYZzKwg9Y/sdNOBiDjVlRYA tkAkc68JrLw72PPO7VdKUzyncV0z3BASRskVdpy+0q8r5XozgL4xwyEBaISz/0k3myJhdVmzsm9 0CdNtkrNGDsWUjLzMM9+OfKqAYukx31FbjcCvYCljTpanyZeuz3Ct4kS2AFVu0jERS1ns55aNv0 GtXJPkV2dqPWGZyN9ywZuFih8H/d6i/HzIolw2cGyeNNPp9sNFSTYILcrjuhAIHOqzVumz0zUwd Ne0brJZ2zlXQaP88Cm6BHygQUtaglTiyAM3rzAMSm1itAPW/Z2IYUUlruz4iPLgqJVH8BBgBsS6 lm7gkwOaylS4XMCRSI+uxjLh5i2zWdysUlijzNpMe9XiuYV X-Received: by 2002:a05:6000:2583:b0:43d:7d24:b506 with SMTP id ffacd0b85a97d-43d7d24b82bmr19545639f8f.38.1776322124333; Wed, 15 Apr 2026 23:48:44 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:43 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 39/47] selftest/gdbserver: replace shutil.unpack_archive with tarfile extract Date: Thu, 16 Apr 2026 08:47:40 +0200 Message-ID: <2a9d7bc66aafb111413331f5c510935b14a86c9b.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235381 From: Alexander Kanavin This is a followup to https://lists.openembedded.org/g/openembedded-core/message/233609 as the same issue happened in a different selftest. [YOCTO #16195] Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit c7468e70c238b056acbe06ef722b62b02626db8f) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/gdbserver.py | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta/lib/oeqa/selftest/cases/gdbserver.py b/meta/lib/oeqa/selftest/cases/gdbserver.py index 1c713331900..fe1fa6dac1f 100644 --- a/meta/lib/oeqa/selftest/cases/gdbserver.py +++ b/meta/lib/oeqa/selftest/cases/gdbserver.py @@ -7,6 +7,7 @@ import os import time import tempfile import shutil +import tarfile import concurrent.futures from oeqa.selftest.case import OESelftestTestCase @@ -41,7 +42,8 @@ CORE_IMAGE_EXTRA_INSTALL = "gdbserver" filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s-dbg.tar.bz2" % bb_vars['IMAGE_LINK_NAME']) shutil.unpack_archive(filename, debugfs) filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s.tar.bz2" % bb_vars['IMAGE_LINK_NAME']) - shutil.unpack_archive(filename, debugfs) + with tarfile.open(filename) as tar: + tar.extract("./bin/kmod", path=debugfs) with runqemu("core-image-minimal", runqemuparams="nographic") as qemu: status, output = qemu.run_serial("kmod --help") From patchwork Thu Apr 16 06:47:41 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86247 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AE898F8808C for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f44.google.com (mail-wr1-f44.google.com [209.85.221.44]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7592.1776322126826079091 for ; Wed, 15 Apr 2026 23:48:47 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Bw809IBk; spf=pass (domain: smile.fr, ip: 209.85.221.44, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f44.google.com with SMTP id ffacd0b85a97d-43d7650202fso3335896f8f.2 for ; Wed, 15 Apr 2026 23:48:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322125; x=1776926925; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=cOJc0sc2X9W0KluyZy40GdVF8HL/+LAlKeITT2hK1+4=; b=Bw809IBkwA7c227/zHOmCU2dgOub4GCtFQExAgDOlHZrDJA5DsMqxC+thE3Q+WD6FP 95jRLm/87tnzIV1r1AIWE4QvWx+6y2BzgQ01dn8X3mdJdrT9YAZnZvKQ4LLx6EPCv2RP sFt9u1LmdSXGSqPwup8M5sH7aBZuyzmhGtzv8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322125; x=1776926925; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=cOJc0sc2X9W0KluyZy40GdVF8HL/+LAlKeITT2hK1+4=; b=qg2lnjLp/7wUXW26CZK1/O8jbk/VGIP3m9wujwAqlkVVEHSOfNTRudl0dCpfcD5PKu 3vvbKQGCiwq+vYYT2I7JEgp0FaNlZhLZn7ThmMSSfJVmqUBwPkLqktWofX+aK8Z5sfUh o/wZ4m1SZ9DcXjmWPfXNTucvPn0tYPZwzvqz8iAKHBy7RLDvvU22OfEjLSCafkwbudgc szI7pBhh3Ey11rhxD81+xjR9eK5iBWzY1TuoeafHsjMdb4nEmF8rvoEmE41NJrsRJyDJ 8PHLvbj1uLsVz/CZQ9K3XoPZO4zgNpYki/cgPQM9hMyE02mQp/5rCkYTehBTygRUnBYT umZw== X-Gm-Message-State: AOJu0Yxdy+iL2kUfnewU3KHGNWbsHys6vws+czBcn51qeiYbN+m4jtpN FXavNbmH10iFucW0fMZjWKAacdqSYfvm4alyJ/5tNtrID3kJC6RaSAMKgLFjPvN9MfF2K/QcPaS FIkzx5Xwh7A== X-Gm-Gg: AeBDiesEjKUbcUzFlQecE2mLFEwtEDkLml1Wa1oHqbtCZyaztqTVhoPCheHqKNlLRgx 0C5MJzrRc//phFupPbPF3jcwJ6hL527BvlJQEHly41iiDFdZuO2N7k+5QsXS4z24YgYuj/4NOeX penq2LU3ywW1dit0SFDN6vwBCpExmofTik3nH/JSF0gsBh4tMmSY86PH9NGo9rrF6AYAuLTJW1w Pn11cC0o7cFXBAWSWd/Dl2i8/hWg4G0ui641iFs02gMF7bUjmuowhemeg7PmV68TnMGDq334Pdi yvehDydq8y7zmSDpIQpiaTEkKoqEeZBLe/mzYIgEysQrXfm/ETMgdhTOpdlMwBpPVFCbMMC1Mct /JBi+H/PzJB4vcD9soqCan0vx6zPP8fDOfaW4BnCKq22UQigbv6puG+mfD7ObXn+CDirAi3eF+W Ily2Wubf+Y0HPPzw5eUd7xWD7D9sd2Eu3Toz4b+O5Yzd07v7g72s9JY3SVOAlMbsI+B8NdEbEIg 8YX6FKK8GHxhbHzrma7L+uvgQrkQYaxWl/E3A== X-Received: by 2002:a05:6000:178b:b0:43d:7940:f143 with SMTP id ffacd0b85a97d-43d7940f22cmr22156209f8f.1.1776322124870; Wed, 15 Apr 2026 23:48:44 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:44 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 40/47] oeqa/selftest: add wayland feature check for tests needing it Date: Thu, 16 Apr 2026 08:47:41 +0200 Message-ID: <17841fd5e64cb2f0e966e848481a1807918dc62d.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235382 From: Yoann Congal When run with a distro without 'wayland' DISTRO_FEATURES: 2026-04-14 17:42:00,568 - oe-selftest - INFO - FAIL: test_sstate_32_64_same_hash (sstatetests.SStateHashSameSigs.test_sstate_32_64_same_hash) 2026-04-14 17:42:00,568 - oe-selftest - INFO - ---------------------------------------------------------------------- 2026-04-14 17:42:00,568 - oe-selftest - INFO - Traceback (most recent call last): File ".../openembedded-core/meta/lib/oeqa/selftest/cases/sstatetests.py", line 407, in test_sstate_32_64_same_hash self.sstate_hashtest("i686") ~~~~~~~~~~~~~~~~~~~~^^^^^^^^ File ".../openembedded-core/meta/lib/oeqa/core/decorator/__init__.py", line 35, in wrapped_f return func(*args, **kwargs) File ".../openembedded-core/meta/lib/oeqa/selftest/cases/sstatetests.py", line 371, in sstate_hashtest bitbake("core-image-weston -S none") ~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ... AssertionError: Command 'bitbake core-image-weston -S none' returned non-zero exit status 1: ... ERROR: Nothing PROVIDES 'core-image-weston' core-image-weston was skipped: using DISTRO 'nodistro', which is missing required DISTRO_FEATURES: 'wayland' 2026-04-14 17:42:00,568 - oe-selftest - INFO - FAIL: test_core_image_full_cmdline_weston (incompatible_lic.NoGPL3InImagesTests.test_core_image_full_cmdline_weston) 2026-04-14 17:42:00,568 - oe-selftest - INFO - ---------------------------------------------------------------------- 2026-04-14 17:42:00,568 - oe-selftest - INFO - Traceback (most recent call last): File ".../openembedded-core/meta/lib/oeqa/selftest/cases/incompatible_lic.py", line 153, in test_core_image_full_cmdline_weston bitbake('core-image-full-cmdline core-image-weston') ~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ... AssertionError: Command 'bitbake core-image-full-cmdline core-image-weston' returned non-zero exit status 1: ... ERROR: Nothing PROVIDES 'core-image-weston' core-image-weston was skipped: using DISTRO 'nodistro', which is missing required DISTRO_FEATURES: 'wayland' This is caused by core-image-weston being skipped because it needs the wayland DISTRO_FEATURES. Note that this is not seen in testing because nodistro has wayland enabled by default since 2e1e7c86064 (bitbake.conf: Enable opengl ptest multiarch wayland vulkan in DISTRO_FEATURES by default, 2026-02-21) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/incompatible_lic.py | 2 ++ meta/lib/oeqa/selftest/cases/sstatetests.py | 2 ++ 2 files changed, 4 insertions(+) diff --git a/meta/lib/oeqa/selftest/cases/incompatible_lic.py b/meta/lib/oeqa/selftest/cases/incompatible_lic.py index 93884f57319..0e225ad02c7 100644 --- a/meta/lib/oeqa/selftest/cases/incompatible_lic.py +++ b/meta/lib/oeqa/selftest/cases/incompatible_lic.py @@ -5,6 +5,7 @@ # from oeqa.selftest.case import OESelftestTestCase from oeqa.utils.commands import bitbake +from oeqa.core.decorator.data import skipIfNotFeature class IncompatibleLicenseTestObsolete(OESelftestTestCase): @@ -142,6 +143,7 @@ require conf/distro/include/no-gplv3.inc """) bitbake('core-image-minimal') + @skipIfNotFeature('wayland', 'Test requires wayland to be in DISTRO_FEATURES') def test_core_image_full_cmdline_weston(self): self.write_config(""" IMAGE_CLASSES += "testimage" diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py index 687640a4016..02fd45fe0d9 100644 --- a/meta/lib/oeqa/selftest/cases/sstatetests.py +++ b/meta/lib/oeqa/selftest/cases/sstatetests.py @@ -15,6 +15,7 @@ import re from oeqa.utils.commands import runCmd, bitbake, get_bb_var, create_temp_layer, get_bb_vars from oeqa.selftest.case import OESelftestTestCase from oeqa.core.decorator import OETestTag +from oeqa.core.decorator.data import skipIfNotFeature import oe import bb.siggen @@ -354,6 +355,7 @@ class SStateCacheManagement(SStateBase): self.run_test_sstate_cache_management_script('m4', global_config, target_config, ignore_patterns=['populate_lic']) class SStateHashSameSigs(SStateBase): + @skipIfNotFeature('wayland', 'Test requires wayland to be in DISTRO_FEATURES') def sstate_hashtest(self, sdkmachine): self.write_config(""" From patchwork Thu Apr 16 06:47:42 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86248 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71867F88077 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7732.1776322127326794353 for ; Wed, 15 Apr 2026 23:48:47 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=golavCTr; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso117139635e9.3 for ; Wed, 15 Apr 2026 23:48:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322125; x=1776926925; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=P7+oiW+E7TFCEvgg7t8LoFkNmsqgnc8T2/jUJQznBMw=; b=golavCTrO2oDk37Y7GIpD8Xybl4PognO1o229HmU10CT/OaC6YE/9qGUoCPe6V7odk k/lFLr8ZbJPVQkC/9Pk0uHarPGw5p1YTUxy1Dg6v1RBCSD2qJZRJtgyzQHizt3k3xkfV cu4kCovSDq2udoaxI4bswrON4Uw30ntdOFrvc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322125; x=1776926925; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=P7+oiW+E7TFCEvgg7t8LoFkNmsqgnc8T2/jUJQznBMw=; b=C6W8CW3eZYuwjYIvpXT2ZB4iNNaX32/EwBKEvpbkbqPLUxEGQhVxLsSXnrYf6xRHHZ 4pYtPUOQnshfbEiCO6rRkrKGjdJvLpe7sm0HDCb5QLXVqplhxrEY/XE2+k1fjXBJIOzM utD9k9VSxtAdih+JjBTtjVvnh6BkJGgz5GMR68+ogfYUFI9D187du7MfwzXS4KhrND+c WkFT3EN3oLEhEVs8qA05cUSxLcRYmdrV+9GUHKfMH1bQRryi8wP4CZhgnVch3/GlTMjy zIrDUE4QoM7CIVuzypUhezzfHrt+Y0m/u5XWG3VwdaRtvFC3MLUxsLBe0XNuipXITzgj w1xA== X-Gm-Message-State: AOJu0Yzy7kzxCgdQeQJsgTw0a4VptCMKtDZlHMBzaDO0btN0jwWNwCLW arwAoPemHoIYwmYW/sX3bHSNkpFHzRWaCFy75cePKQHboVHZObLqUe9ZS9Wvfm2F4lVUP0FbWhZ ZruOSWjyLzA7H X-Gm-Gg: AeBDievz7pRm4/uSSNfavf3q1eLI6KiJ+Haa4IV6YXYmUhduFQpSp8bC/mLfCQrBSeB dFc1NqAcSqpdyv++tyPWh8EDUU1pdgx0RSNDhd9HTN3WIsb4daACne1ehWxqoPQTEv9Fz9pdQeD DZQSo7o33aabSmw/5SpLnuChDeX+dRxLBhWMhMT+uMvlyMXgGhcoUSheaKl7IJOsDgBaLkX49w1 77iNGaw/5/QIvRXMVXuLIXjO/a76GvrZ/xIAFjB7cAHIx3NU9VLNCsYOQ2m4Q7NP5Q+AxZwvzGM vJMw7Zn385ow5/Eh5TEjBORog9V/suTRQj2Gr2UKn8gLx1WKCDZjJDZthmEKbOhkNTnk3DUrJX1 dbifIgO6e6Q2GEuUvhzhyKXkhCp8i/IfYl+ELLgo6QAP9Jq2sO5Z12xlAIuUaQuNT4u6qtY+iYl GEvSnOKK9A6Sa2q/rDfwi9NaZohmfBTXRPe2Je4Y+3uUFj1+DzCloz1TkXggfwttsI2fw9OhZ92 0JN3LZdrNInZCYz8Rk6AQbgCM5d6t/IqVkmYA== X-Received: by 2002:a05:600c:3149:b0:488:ae6c:42c6 with SMTP id 5b1f17b1804b1-488d684319emr336687495e9.14.1776322125422; Wed, 15 Apr 2026 23:48:45 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:45 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 41/47] report-error.bbclass: replace 'codecs.open()' with 'open()' Date: Thu, 16 Apr 2026 08:47:42 +0200 Message-ID: <52d542285b3345d474eb5246e178d268138a443d.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235383 From: Trevor Gamblin With newer Python versions, codecs.open() is deprecated: https://docs.python.org/3/library/codecs.html#codecs.open Replace it with the preferred call to open(). Signed-off-by: Trevor Gamblin Signed-off-by: Mathieu Dubois-Briand (cherry picked from commit 58b9f90779d1227e30a7de4948b10e49fb5b5ac1) Signed-off-by: Yoann Congal --- meta/classes/report-error.bbclass | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/meta/classes/report-error.bbclass b/meta/classes/report-error.bbclass index 2b880c8b0c7..01ac1f2a37f 100644 --- a/meta/classes/report-error.bbclass +++ b/meta/classes/report-error.bbclass @@ -10,19 +10,17 @@ ERR_REPORT_DIR ?= "${LOG_DIR}/error-report" def errorreport_getdata(e): - import codecs logpath = e.data.getVar('ERR_REPORT_DIR') datafile = os.path.join(logpath, "error-report.txt") - with codecs.open(datafile, 'r', 'utf-8') as f: + with open(datafile, mode='r', encoding='utf-8', errors='strict') as f: data = f.read() return data def errorreport_savedata(e, newdata, file): import json - import codecs logpath = e.data.getVar('ERR_REPORT_DIR') datafile = os.path.join(logpath, file) - with codecs.open(datafile, 'w', 'utf-8') as f: + with open(datafile, mode='w', encoding='utf-8', errors='strict') as f: json.dump(newdata, f, indent=4, sort_keys=True) return datafile @@ -86,7 +84,7 @@ python errorreport_handler () { taskdata['task'] = task if log: try: - with codecs.open(log, encoding='utf-8') as logFile: + with open(log, encoding='utf-8') as logFile: logdata = logFile.read() # Replace host-specific paths so the logs are cleaner for d in ("TOPDIR", "TMPDIR"): From patchwork Thu Apr 16 06:47:43 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86245 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 91735F88089 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7593.1776322128424879671 for ; Wed, 15 Apr 2026 23:48:48 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0W1biVx8; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43cfd96354aso4680498f8f.1 for ; Wed, 15 Apr 2026 23:48:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322126; x=1776926926; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0uHzev+D2TX5lx68FpEJum0Jy8kOUbQhyO7z07ltsbM=; b=0W1biVx81eWQefgETkJ0rgaNxQhQ5BX6yY8VlFx4r1cZIvuJKkjh51dc0lhuoLZc7T xCiPbpmCXiHQ/XfSFSKTqtR5elVC4/6DDL6PjQqRxN5vWlnNHEXCcSTZcFuMoSoUrHAX VjXM4tkPCDqxy0Lec1fmfNtZ1ebsukgAul024= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322126; x=1776926926; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0uHzev+D2TX5lx68FpEJum0Jy8kOUbQhyO7z07ltsbM=; b=dFc3h0GbIGyIOkps/YF2Xu0vrXciwg51HXvP9gJPGXaQ7pQvr9WZHm32+xZSMxutLq 0Pwi1+Q88eFK7dfQq1KWDFnDZ9zVOSJ9yQuAsYG8NxcxRPBprEGLe49aAjeKxRJrGusX KwWhU9boSlohLyGryUZJL+FqSxEXBGJkMNGOcmeNsdUnOzLRw8xuj2mFKB6rx/iXnmE8 /Z5BfkIcr1+0YfmfHKwNq3X8nYu9fZeb0PLXyBOH4thL4I7aGxbvTFpf+mSdfy8IlYtS NsWH22zGEm1ObV6qTCutflGRAR6Il29hUmQ83iFFgPDyZ/jwH+3HM2akKJj2SCvwBdAZ Ptag== X-Gm-Message-State: AOJu0YwA6QGw1a5SICwA1nOWKifhjc6wVQztbFg9+Ld1GWRn500Uoaff zKqeO15XcGFTn3j7go1YBUXir4zZwJKQm6O57tXOUtYkP0nlJiJJFCg7GHRuqaGO9hkhi6LU0k0 GI2OdSuDALRqc X-Gm-Gg: AeBDiesen6CX5NEv4aRtJkIYba8yLbphG0fb7TL6lYURl366LPMVINISI3bQjdY88hm vj4f3F7C0HiO5jNnfAhM01APfqM6p/o8NRIDBFQfvSfhaTaL5K3y5EfuUmHFq03O+LX2qXChxhQ T4AKoe8GxTdso+WwwngAPqUvK57vxZ7AuHNDT6mSGQNKT89cvGHm8upwVEMTSdN/wZCj4rtkw+H n/gxZvMENyIlUa+I36mQ8qKpSBhovyZ2ihbg0bYGiADhExcC2S6FC5cIODtJvtM7x5CIADvod39 p0kma2X0vgBdY9D5TJ5tzxySFtDCsJywbCUFM0WT3KISOBrk5kOd+QEE27i8wdBKcAmBm+x7KSr Dj/7UNQ4CKItHGxIUm8VR64umFDfSYIDjmdHekxVKVCti/f31Fm1PvTmBPer5vcDWvVNDN+HbFJ mw7tSWZA3whybuZXdFhTl67kw7CzZr+MVnv0KZ7MNh3GV5dDVjQxImnKG6WMFk88Sk5Qpe/mkQC XBPIcGkwOu0kuE5CN9xZDX8BbfVOQ+JsAMLaQ== X-Received: by 2002:a05:6000:1144:b0:43d:7403:4b57 with SMTP id ffacd0b85a97d-43d74034bfbmr18402061f8f.10.1776322126388; Wed, 15 Apr 2026 23:48:46 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:45 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 42/47] oeqa/sdk: Default to https git protocol for YP/OE repos Date: Thu, 16 Apr 2026 08:47:43 +0200 Message-ID: <5d669fd8ed500b753859e8e76ac875d83252311b.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235384 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- meta/lib/oeqa/buildtools-docs/cases/build.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oeqa/buildtools-docs/cases/build.py b/meta/lib/oeqa/buildtools-docs/cases/build.py index 6e3ee94292b..9f963f18f8d 100644 --- a/meta/lib/oeqa/buildtools-docs/cases/build.py +++ b/meta/lib/oeqa/buildtools-docs/cases/build.py @@ -15,5 +15,5 @@ class BuildTests(OESDKTestCase): """ def test_docs_build(self): with tempfile.TemporaryDirectory(prefix='docs-tarball-build-', dir=self.tc.sdk_dir) as testdir: - self._run('git clone git://git.yoctoproject.org/yocto-docs %s' % testdir) + self._run('git clone https://git.yoctoproject.org/yocto-docs %s' % testdir) self._run('cd %s/documentation && make html' % testdir) From patchwork Thu Apr 16 06:47:44 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86242 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7EC2BF88084 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f67.google.com (mail-wr1-f67.google.com [209.85.221.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7734.1776322129057035013 for ; Wed, 15 Apr 2026 23:48:49 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=SHCxNCp3; spf=pass (domain: smile.fr, ip: 209.85.221.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f67.google.com with SMTP id ffacd0b85a97d-43cfde3c3f3so7716553f8f.3 for ; Wed, 15 Apr 2026 23:48:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322127; x=1776926927; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MQ1nnPZD4T81cHP4CPJAEtZLqfKwRd1IwiROmD+jMLs=; b=SHCxNCp3JvmV7nOaERxDifGDLcznS+aDscAELjUOrGv/efck7KR/Df0mqGbhNX1IJH HYQTQNcqWN/58LaajfeeCiD7lLl8tGWVPDprK+KAZIphH+O9Jzw1/kDjzyJNXXTe1YHi glowshzbz/oMBQNcWp0CkwGb5DhgymQHa3rW8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322127; x=1776926927; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MQ1nnPZD4T81cHP4CPJAEtZLqfKwRd1IwiROmD+jMLs=; b=B7QFQtAa24zHWe4zgyU5gR88vbqWoLdEFUf7Wj7ZXVLuqqqeKpqUtA0lXxg8dRZ++F /uXI3K7/eMCb/tpDFuzGhRaAJc460tISfJ9yegVCbmfUZhYznWyYYU1iZxPRmKy7Sg08 Uf1SudJq2SSh6ydD24WJ1rHkPzOI+DT65tMHPOvIaHP5dpjvAirMruOAAmzcGDhLv0rY hrPL41g9XvnS2TagFclhFwWpf2iruQ0Qt4J01qto90p7bMxFxfDXSm177zuAG723wyQr zAJq0l5a3EvuBZKNNLgLTPMci1ln/YUdwxJ1c+ZGJ/IiHaEdcrBPIjiVBqTenLC22UFx MKNw== X-Gm-Message-State: AOJu0Yz+22aWlzOK6jFLeP87LnzQqsB4Xl0R6YYp50F68ghAx2qtE6xI o+LBN8Z/WnPf0faVup7ipwLEnlWGOyLFvW/pPAWULz3cQBpQlo6F5m5h6PdKgZLSkoPLr48HVFU E11xyKa/eCFBP X-Gm-Gg: AeBDiesARhkIMe9/fmyo8t42hjRWUFufW7d6RxDqgohR0BjQRRcTh6pwK9+dUIuP+tq vm3gxs9JtAZtiFpunbRvfmMKnNqOuSioM7V8WRKsKOsUgdKJPJ4751Hm03Wypnyvigr5Wp91w5a 8urZjpO02bT/pGl1JhFQOZOrwtBpPvaerrjy8oe0e2Gl5biGMwzZvawTn4RkWLCBooG4o9jsQgW OMQ1wWAC8Lnf8R7JwuaPHdN98TLlU+7QYhh9XHTTDEuRL2ZoVgFyEouj6RxNGumHpVVvWNKFPvq cNublLCIDXiKvyRb0832dtBB5nPkl5FPiqD7sH9Wly2xzc/EcdkNjnJQXa5xoPZmzIUekbPHL79 O1O2WaW0LgkvThO771mW+GR6laMYHT3UZKMEo3zfjejxCkEvCl7XRoGkzd3phESJ5qfraPVSH0l ShvaHhksINZXB8oH5x/hfvFZf8IJ9qF7MHSC9GYAvwqO6GT6YNmhQk0F+hKtGd8oTml4xAsjlQ6 ajCyH0sVrjImA5ghRsEBkAWoshaINat2SfVfg== X-Received: by 2002:a05:6000:2886:b0:43b:7ff5:fdf7 with SMTP id ffacd0b85a97d-43d642c8664mr35771972f8f.29.1776322127012; Wed, 15 Apr 2026 23:48:47 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:46 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 43/47] scripts: Default to https git protocol for YP/OE repos Date: Thu, 16 Apr 2026 08:47:44 +0200 Message-ID: <95cf84a4ea77c4a8af2cf814857f50c8a3508c1e.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235385 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- scripts/combo-layer.conf.example | 4 ++-- scripts/contrib/patchtest.sh | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/scripts/combo-layer.conf.example b/scripts/combo-layer.conf.example index 90e2b58723b..4ae3db45ab1 100644 --- a/scripts/combo-layer.conf.example +++ b/scripts/combo-layer.conf.example @@ -14,7 +14,7 @@ signoff = False # mandatory options # git upstream uri -src_uri = git://git.openembedded.org/bitbake +src_uri = https://git.openembedded.org/bitbake # the directory to clone the component repo local_repo_dir = /home/kyu3/src/test/bitbake @@ -76,7 +76,7 @@ last_revision = # that matches the original commit. [oe-core] -src_uri = git://git.openembedded.org/openembedded-core +src_uri = https://git.openembedded.org/openembedded-core local_repo_dir = /home/kyu3/src/test/oecore dest_dir = . last_revision = diff --git a/scripts/contrib/patchtest.sh b/scripts/contrib/patchtest.sh index b1e1ea334b9..550b6a88f3c 100755 --- a/scripts/contrib/patchtest.sh +++ b/scripts/contrib/patchtest.sh @@ -75,8 +75,8 @@ source $PTENV/bin/activate cd $PTENV # clone or pull -clone git://git.yoctoproject.org/patchtest $PT -clone git://git.yoctoproject.org/patchtest-oe $PTOE +clone https://git.yoctoproject.org/patchtest $PT +clone https://git.yoctoproject.org/patchtest-oe $PTOE # install requirements pip install -r $PT/requirements.txt --quiet From patchwork Thu Apr 16 06:47:45 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86252 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E947DF8809B for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7735.1776322129770710476 for ; Wed, 15 Apr 2026 23:48:50 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=vJhZHrPD; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b3f8fa2bso2693975e9.1 for ; Wed, 15 Apr 2026 23:48:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322128; x=1776926928; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=h9Nnrvx4/eK/kurTiCBxu/SuYuMbkiFrB430vDHwplU=; b=vJhZHrPDy0OxU8sP05Mfp8tur3RiU3orYp20TwhqzAy/KjNlqgelKCIZ/eKfGuSm6b krh1zHyM35P2aEggMfjJCLwUVMv4UG2O30+Rry8TX4RqjNvVZRkhkY10kiPrkHTZsMBw SzygDqhtPtIE9OBh6nq5vOFODseL107+c2HtM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322128; x=1776926928; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=h9Nnrvx4/eK/kurTiCBxu/SuYuMbkiFrB430vDHwplU=; b=AHtyRPIMUcAMLVhnMx6DLiTwTzOSzb1tVgJ9jGB5e26GzDFy6emvoTGfSuLWVIh3Eh PJNyNvB29LBJcErycKUEdy3MS/EfE9joiuOPFBTQBM71EGvJhq2LgKa9l43uPlrdDx6S VN+RsGBvddvgck6rvFqbhvzBXWaO8DBhLfEewRMxYP8pP5qlf/0+V0CirY26N0x295O2 ujObyJkYrx26r9wwEHev3pcW18Q52J4JUjLBc3ymGksJBKY2UHgRGk8OBRV9zoVFZejW A8PJHtP2mWuBLhU8Mgeylkff8pDOgZUXYsD82Py6GJuP1S94MiCcaXivgXJ36nSVYCPh 75ng== X-Gm-Message-State: AOJu0YzB5jMXvSEoaVxX0O6OZf9vUvRmMxRox0sqN7ecu1jS6v9XEFYt VoUiYY3ElUDq4o3LXZxUcsgKrWb8uElEGXjw5oxeLj7fltn9IR09kTL57gVeASPpzVujCXZxohH 7Cx/pjal/jniS X-Gm-Gg: AeBDietCMslElyktbc2jC2aTTDf1tlzLdC2DEA1eRfN4jkMPBhAb0qKU5Co9pdqdg3x 2IAWjn8ItB2GK5mlUHD6DifEOfPOCa+qvPJU8NvvtBDAB9oH56od18tVz9Ii8O6YSCyWi+GMgXX 9xdjEXBe9AwM5U9QOoKeAgY69oiKTvFSGIfx8MkrP4O5iTdDNfqryn2B0WH/P9ZaxUHQTx+QOWv tZldDhg6s+fGry3fStvOVC8oQpKDraKpYE9Cm66CXoCcYG+uVIw/VMkrtq6lmuASco3BCh1eXvS cO17ZbFrx/MNaN9jKOY75+OT5TARsZFpkeANi60UTLHUcjvQ+iqNu2WmBjm2VDbQd/g5BslhLak 6C1hsSXMCdodvPeR8i6Ct6TtdxNvdsCGZAsClY3Npg/+bZUbumUXV0JXwruF/U3tWs1He98rmAQ rh2VCVh/u6zPhzxZvX94+ruXJUd5R/s3dZIfAJYS0jirZzXIYUjFHZktJ7UnxjJCE88+opdazIs Bq2SFeu6UePoy1vNmjVg/dWftNl0gqFj2VRvA== X-Received: by 2002:a05:600c:34cf:b0:486:fe83:861c with SMTP id 5b1f17b1804b1-488f47ea338mr29406765e9.7.1776322127651; Wed, 15 Apr 2026 23:48:47 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:47 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 44/47] oeqa/selftest/git-submodule-test: Default to https git protocol for YP/OE repos Date: Thu, 16 Apr 2026 08:47:45 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235386 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Use ";protocol=https" for the parent git submodule and, also, update the SRCREV to point to a commit where submodules are reference through a https:// URL instead of a git:// one. Update the expected output of the archiver test. Signed-off-by: Yoann Congal --- .../recipes-test/git-submodule-test/git-submodule-test.bb | 4 ++-- meta/lib/oeqa/selftest/cases/archiver.py | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb index 1c0886dcbe2..09f6b2e4a7e 100644 --- a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb +++ b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb @@ -7,8 +7,8 @@ INHIBIT_DEFAULT_DEPS = "1" UPSTREAM_VERSION_UNKNOWN = "1" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" -SRCREV = "a2885dd7d25380d23627e7544b7bbb55014b16ee" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" +SRCREV = "f280847494763cdcf71197557a81ba7d8a6bce42" do_test_git_as_user() { cd ${S} diff --git a/meta/lib/oeqa/selftest/cases/archiver.py b/meta/lib/oeqa/selftest/cases/archiver.py index 612ec675a78..82b0293338a 100644 --- a/meta/lib/oeqa/selftest/cases/archiver.py +++ b/meta/lib/oeqa/selftest/cases/archiver.py @@ -335,8 +335,8 @@ class Archiver(OESelftestTestCase): bb_vars = get_bb_vars(['DEPLOY_DIR_SRC']) for target_file_name in [ - 'gitsmshallow_git.yoctoproject.org.git-submodule-test_a2885dd-1_master.tar.gz', - 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_120f4c7-1.tar.gz', + 'gitsmshallow_git.yoctoproject.org.git-submodule-test_f280847-1_master.tar.gz', + 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_79a0efa-1.tar.gz', 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test2_bare_f66699e-1.tar.gz', 'gitsmshallow_git.openembedded.org.bitbake_bare_52a144a-1.tar.gz', 'gitsmshallow_git.openembedded.org.bitbake_bare_c39b997-1.tar.gz' From patchwork Thu Apr 16 06:47:46 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86243 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5BE1DF88078 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.7736.1776322130346096756 for ; Wed, 15 Apr 2026 23:48:50 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=JhWtOdD2; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43cff5dafc3so5430930f8f.1 for ; Wed, 15 Apr 2026 23:48:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322128; x=1776926928; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=mDKd2bbbfFIyySKfofCK/Fc2GManWznOSa76B3168KU=; b=JhWtOdD2G91oYdbn0g0TOosqPkQB4o7bC6M1FFlIYe8gwTRWe4d8AxpVkXhRrCQhF6 EvEIj9ouHosFS2RF6MvAMm+QQTe6GwOiD39hHfyUNGLei62szNAENghsM0DB3Wnst77t NkP/l/9hbq+KUJqjSFxzUmoNwgNlvYXlBColc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322128; x=1776926928; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=mDKd2bbbfFIyySKfofCK/Fc2GManWznOSa76B3168KU=; b=kSUmQLqCXf7yQ8LUcaMcWH34BZOFckbtFcZpDo6wAZjHlmyCt3wh1DDVL9vQ/z9+2d jnUrRUElquVJj1KwHu2i+LiTlZqYBKElGnbyH04vi4cY9+pbxjbcTa4N1SrztTiNFmVN UYtv8dglSkJ6Rm+XLpV6FwS6OZ1A15+VXDCFav82d7rVfwjw7ESzgXZH4caf9Dccs8JY R/FnRgTrXhwcF4NyvXYPBlBGmYZVlggSxwIiptQcOtYIX5KK72MjiaiS9NUBvIJe4tZ4 q0TyjBhteJ+PKJHzLU9Ko4MxIyx2qY0UYeDjDVLazxge09KkpAAI/Ptx4eU0hsQ7p45t h8/Q== X-Gm-Message-State: AOJu0YzoohH0Qw9cgd1aZ+HYkm0zdn7KxF+H8Zs9S3FUDNiJ11mFWAkU TR3J6KMTQPYYDeMnvMx/cT6X2+HJDwpXfCEmWRSCvDJfIXmSyy3mthhtFxc3ERNeFSrF6AjuoTO ckAGKxjNEO0e8 X-Gm-Gg: AeBDieuRwk8dAwvnyhAqH7XkRECslNThXLcXGhC8RYJwbde3Ptp+82nt/bu8FlCMF8B 6jDjafKr9IRVgwx4kqBQShqBzfT5kA/zu8srhu8YdoYdY1SOCoH2Wh91C5azPyOS2JmP7Mp7FEL T1iObv/hndZyImhLx9o6F2/kgClGG0CUMuQRaIb6lGoCAEVBXselr7bNvpBzbdUvW7WieAH6HWP 9SqWZ/Mh/Fht/xPvD6SNifbvKpPlFMh4vRt8GfSXvl17K3CtL2dkLlOTf8kaOMJFOpltc6WONKH ExbQpwNkPJgZe/2Oz10fFgN+UtdF5RHn7wMKhtDHzplnG8MLBBLQsttcl1MxacZnSS842RX99jJ 6qM68CoO71PLrRt9yhGwkY8fqrTmTHMLUQhLMcXhiaJs0PTjE9ocbyZ9Y0RgsW/Gi6ecNuYlHak AKS6BCE1Sc+cfoZsAmi9/c+90n5BcKFv9hxpnLtMbrMDV/USJl/H+IlynCKIXJg86ZDdRT2SSOf M15MCQd4ypao5+i+Q3g0Vyf4uVEY4Nr3hpWbA== X-Received: by 2002:a5d:6a90:0:b0:43d:6fb7:fedb with SMTP id ffacd0b85a97d-43d6fb801bamr18622809f8f.36.1776322128357; Wed, 15 Apr 2026 23:48:48 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:47 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 45/47] meta/files/layers.example.json: switch to https clone URIs Date: Thu, 16 Apr 2026 08:47:46 +0200 Message-ID: <70cb257f3f81da851157b209731fada79cd476e2.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235387 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- meta/files/layers.example.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/files/layers.example.json b/meta/files/layers.example.json index f3b65220831..8ea1f225e8f 100644 --- a/meta/files/layers.example.json +++ b/meta/files/layers.example.json @@ -20,7 +20,7 @@ "describe": "15.0-hardknott-3.3-310-g0a96edae", "remotes": { "origin": { - "uri": "git://git.yoctoproject.org/meta-intel" + "uri": "https://git.yoctoproject.org/meta-intel" } }, "rev": "0a96edae609a3f48befac36af82cf1eed6786b4a" @@ -32,7 +32,7 @@ "describe": "4.1_M1-374-g9dda719b2a", "remotes": { "origin": { - "uri": "git://git.yoctoproject.org/poky" + "uri": "https://git.yoctoproject.org/poky" }, "poky-contrib": { "uri": "ssh://git@push.yoctoproject.org/poky-contrib" From patchwork Thu Apr 16 06:47:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86249 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D59DCF88095 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wr1-f66.google.com (mail-wr1-f66.google.com [209.85.221.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7594.1776322130978192411 for ; Wed, 15 Apr 2026 23:48:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0oMQ31SI; spf=pass (domain: smile.fr, ip: 209.85.221.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f66.google.com with SMTP id ffacd0b85a97d-43eb012ac4fso519025f8f.0 for ; Wed, 15 Apr 2026 23:48:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322129; x=1776926929; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=wvestLG+2fVfR2dHIKIgfyF55VeM3T3KshMVwHxPZoI=; b=0oMQ31SIVSYUtyVhOjStMQCMLli3effv7Xr9Ia8IQO2qrlYVdWjNWrvP6gG8ASUeAd kmwCJzj80Ed37hiFG681dsFEEdVIJQkPvj9/3t955gn0j/Fan2DrMdLvwpiyBFZ8nGfS 4CkEHLImS4N84Wpqql0DTWn3Rv8umdidp4NT8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322129; x=1776926929; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=wvestLG+2fVfR2dHIKIgfyF55VeM3T3KshMVwHxPZoI=; b=l1HVrj/sxHIS4iUQR9b9nExLpeZFT4pam3Ye3VFnm5gaQ1p7mJlS50QjPoqsn5u9qA 5jbjY8aec7qaXDZkS3f8iFxydnx2h7X8YOV3Jso9m+IJ5AmzjLimaBp06Y0tsIpnFvEQ xBVfgud4P2tcsRupQtesprxhY1L490ajgwvg9fceX9Y0pwTH5jp9ZyMqcCkQjedpOmb8 HrzX4f3DmkUCsWju+7yZIFmkBnm2IQ7ydOX4+5UkVZSbbNDar/viSkjGtN7n3vUPeH2f EiKio3ZYS9PjFrmOfV0Lf+ko2iTWPXaEz795AB1B8GEQmxA6GzkVDWwtDqdDqT1dlsA8 A60w== X-Gm-Message-State: AOJu0Yxh5dPV8sE8W/78eKvPG4z17bTz5uGjr1FilCP3HB6TnMnO+Q+9 jTbIZBhbD7tit1we+ZQrGWWcgt0eNx6kSHelIihdTatbArQMZMDxo4IujnHqGDyHK6qVaZ5M/hg KhWSI42jh1YQW X-Gm-Gg: AeBDievukDI697z+O5nxnxEcIHPk09eeCzXez2Oid3w1oIoSK4/lkeQ+4e5R/+8zzlE JjSYxDoa86xbH4LqB33LjCkQ33zEwnCMnBaw9gz4UKo6Q2ECVVmYrCDwQ+96DXSvGo6Q9b+NBIR oPJ/sIfUVFY9nYRBxaMliqRjCoKlbtl+DSmuglqxC6VAbWOfkGrWzFs7SygSwgIoWwd6ow+MA8B 5vy9aHY9GTw45EXR/7JYTawDnKP1YNPSNveDUeDTDpaje8sPrxwD+aX1TKokULlHsIVlap71FKb QGytsJ98/6b3p1S7++Y0vCOc7qIZKZe3G0Ua+XhlorLSJhX3owh8jyhJAwbxDbRJFofNkyzUn+v DvfQUyVDSDkDQOzCK9igm/cFp9RFliXWU7lgkZsqLxxHFYtH72f7A+CPOSGYHnRkyOYsnDxXRlB 79+1QiO0gkHgwZ+tjfYJaNpUVe+EEqfXGMuxpe5xnkJ+wA3PW1VBrd3+wANgAAFkMoLTrju+i8Z uPNU5+N2urIOSWnTyWRx2D63VajYVknw7+8n/8dWveRnR/P X-Received: by 2002:a05:6000:1847:b0:43b:4f0c:aefd with SMTP id ffacd0b85a97d-43d642b9e05mr35251016f8f.23.1776322128952; Wed, 15 Apr 2026 23:48:48 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:48 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 46/47] build-appliance-image: switch SRC_URI to https protocol Date: Thu, 16 Apr 2026 08:47:47 +0200 Message-ID: <148737aa32d34aee65428db552f63d7842215a6f.1776321810.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235388 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal --- meta/recipes-core/images/build-appliance-image_15.0.0.bb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/images/build-appliance-image_15.0.0.bb b/meta/recipes-core/images/build-appliance-image_15.0.0.bb index dd6b5081c10..b40ebf51d02 100644 --- a/meta/recipes-core/images/build-appliance-image_15.0.0.bb +++ b/meta/recipes-core/images/build-appliance-image_15.0.0.bb @@ -31,9 +31,9 @@ SRCREV_oe-core ?= "05d149ee0905cbce655a9e0c3767e8fdfcbb8997" SRCREV_yocto ?= "9b98ec5e6cfb6c9dc74d3c2e6304eeb274f7c487" SRCREV_FORMAT = "bitbake_oe-core_yocto" -SRC_URI = "git://git.openembedded.org/bitbake;name=bitbake;branch=2.16;destsuffix=bitbake \ - git://git.openembedded.org/openembedded-core;name=oe-core;branch=whinlatter;destsuffix=openembedded-core \ - git://git.yoctoproject.org/meta-yocto;name=yocto;branch=whinlatter;destsuffix=meta-yocto \ +SRC_URI = "git://git.openembedded.org/bitbake;name=bitbake;branch=2.16;destsuffix=bitbake;protocol=https \ + git://git.openembedded.org/openembedded-core;name=oe-core;branch=whinlatter;destsuffix=openembedded-core;protocol=https \ + git://git.yoctoproject.org/meta-yocto;name=yocto;branch=whinlatter;destsuffix=meta-yocto;protocol=https \ file://Yocto_Build_Appliance.vmx \ file://Yocto_Build_Appliance.vmxf \ file://README_VirtualBox_Guest_Additions.txt \ From patchwork Thu Apr 16 06:47:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86241 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3072EF88073 for ; Thu, 16 Apr 2026 06:48:53 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.7595.1776322131626654489 for ; Wed, 15 Apr 2026 23:48:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KC8WY+aF; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488af96f6b2so100256615e9.0 for ; Wed, 15 Apr 2026 23:48:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1776322130; x=1776926930; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=xAd0/5j1V5xgW4q/pId9w5+bSBm8u0tp0yA30KouV0A=; b=KC8WY+aF4F8BZWka0prc2GWokHs/wg6yP5pO/axP1WOqqMwGrwnPm8/yrfN/dqStNz cHxYkEVQIlsrMAorNtwG50wI9tUh8IwCK0/tWQ2uQKUR1GRrMhyW60Ic27LZU5VQSlfZ OlXiLFlCdY7P6ZtCBCsNd/B6n+iVojWj6tF8A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776322130; x=1776926930; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=xAd0/5j1V5xgW4q/pId9w5+bSBm8u0tp0yA30KouV0A=; b=gq4R3NlK36Zavc6EHnSpknPchC66awBrZ1nXkXJJuJU0hzmqvZx2RNjeAn7ogKo/bF WZwqbyZVXEAPbicDUKtzrUduaGec1B2+tICeYV7qEPbExzX5C7gvQQ5O2ib3nLpJGzS6 8GThaAyY7/PToE8Sn2+xSybQnlLSKRJndvjaOmO/g8cpmsBn2YsswffOHaJXZLRFSD+Z U3Ku9gPXbVkK1Ia7zaftvDOuG0kUSE3RjZmWFrELMsBygN3t6/v74fx2dAztjomJDOsB WA/ZuQo00qJBafHzNYvsATUmmXXwvrcKZGWFX/NhMqgujNqwX8hYmOImIPfPJPrrfxLy KGGQ== X-Gm-Message-State: AOJu0YzZOZC1RTlyGbzp1opGUIvcft+9hfeh5yyhVzyHZQhoV6F5zw4J fZ3MeY965rI5BVL+QH2SPqiX6WsPDo/zbWbfl6xdt3PSXKmlr0R0+GtZK6F1yiFVHMgPVuuBZAX O46BohtILeiU7 X-Gm-Gg: AeBDieu2aRuCsty+DaOg7VPKUVChkQ+qWsu7N11H5o2SwyilLYYvZTiZgf/+8fc6/nj 5Qa0Pg1CH0dModBlVSmc7DPnLvrBoWWxJTotVPsf26A7w6Gxji3eHHtbXVonXwMlxBcmEN0C2TT tRxdvCz1RNbyXoAvZqPb1Lx04qBGFxJT+brUpwPvTkuofoe2+jfSOvvuiHKV2xYLAuyUKhyf1PD /iitwgPxHdjStH4Lgyi2U7qtdClnFhmEZIrwYW9H+6DwpW8qUkt7XX5dCjiqDN4fKxBVQepla3U JAJklvs3krd+YKJ2pM2nwdcn8v063liUD3Qvk2KaIVE+lNRtcb9hh/TbmLbbSS6bRdTl3hjHmqH B447JNxLxwd0nModKpzL47G0Zqq5EBRHKWf/WHMxEPn8vopXRqL7NTvXkUYXEeKARKu9tSTALzD Vf/QZXy3FYD77BqcZEgfIUBe/yljhPoJztDLIrisr3GcHjENKTIbXJt/0HBNPAZjZD7eW26bKJO kK+dbdP+Wflz8ZmQ24nhvygONtPRwab1ZY6ew== X-Received: by 2002:a05:600c:c08b:b0:488:bc6a:528d with SMTP id 5b1f17b1804b1-488d68867a0mr243292965e9.22.1776322129564; Wed, 15 Apr 2026 23:48:49 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43ead3d5ea9sm11200017f8f.21.2026.04.15.23.48.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Apr 2026 23:48:49 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][whinlatter 47/47] scripts/install-buildtools: Update to 5.3.3 Date: Thu, 16 Apr 2026 08:47:48 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 16 Apr 2026 06:48:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235389 From: Yoann Congal Update to the 5.3.3 release of the 5.3 series for buildtools Signed-off-by: Yoann Congal --- scripts/install-buildtools | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/scripts/install-buildtools b/scripts/install-buildtools index b9c008a2ecd..7807bde910a 100755 --- a/scripts/install-buildtools +++ b/scripts/install-buildtools @@ -57,8 +57,8 @@ logger = scriptutils.logger_create(PROGNAME, stream=sys.stdout) DEFAULT_INSTALL_DIR = os.path.join(os.path.split(scripts_path)[0],'buildtools') DEFAULT_BASE_URL = 'https://downloads.yoctoproject.org/releases/yocto' -DEFAULT_RELEASE = 'yocto-5.3.2' -DEFAULT_INSTALLER_VERSION = '5.3.2' +DEFAULT_RELEASE = 'yocto-5.3.3' +DEFAULT_INSTALLER_VERSION = '5.3.3' DEFAULT_BUILDDATE = '202110XX' # Python version sanity check